Deterministic, stash-free write-only oram

DS Roche, A Aviv, SG Choi, T Mayberry - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
Write-Only Oblivious RAM (WoORAM) protocols provide privacy by encrypting the contents
of data and also hiding the pattern of write operations over that data. WoORAMs provide …

Structural weaknesses in the open smart grid protocol

K Kursawe, C Peters - 2015 10th International Conference on …, 2015 - ieeexplore.ieee.org
The Open Smart Grid Protocol (OSGP) is currently deployed in various countries in large-
scale Smart Metering projects. The protocol was developed by the OSGP Alliance and …

Analysing and exploiting the Mantin biases in RC4

R Bricout, S Murphy, KG Paterson… - Designs, Codes and …, 2018 - Springer
We explore the use of the Mantin biases (Mantin, Eurocrypt 2005) to recover plaintexts from
RC4-encrypted traffic. We provide a more fine-grained analysis of these biases than in …

Implementation of RC4 cryptography algorithm for data file security

AF Doni, OAH Maria, S Hanif - Journal of Physics: Conference …, 2020 - iopscience.iop.org
Communication in the digital age plays an important role, a person can carry out various
transactions or exchange data practically and quickly. So as to pose a great risk to …

Efficient congestion avoidance mechanism

A Dracinschi, S Fdida - … 25th Annual IEEE Conference on Local …, 2000 - ieeexplore.ieee.org
Increasing uncontrolled best-effort traffic deteriorates the ability of TCP to control congestion
and is a source of high drop rates. This paper proposes an efficient congestion avoidance …

[PDF][PDF] Security and Simulation in Modern Computer Hardware

SCP Neves - 2022 - estudogeral.uc.pt
In the last few decades many aspects of our lives have been moved online. Banking and
payments, health care, private messaging, or critical infrastructure monitoring are just a …

Analyzing efficiency of pseudo-random number generators using machine learning

S Kumar - Proceedings of the 4th International Conference on …, 2016 - dl.acm.org
Random numbers are very important components in cyber security. A main application of
random numbers is in the field of cryptography. PKI and TLS based encryption uses random …

Statistical attacks on cookie masking for RC4

KG Paterson, JCN Schuldt - Cryptography and Communications, 2018 - Springer
Levillain et al.(Asia CCS 2015) proposed two cookie masking methods, TLS Scramble and
MCookies, to counter a class of attacks on SSL/TLS in which the attacker is able to exploit its …

[PDF][PDF] Design and Analysis of Memory Access Pattern Protection

仲野有登 - 2019 - catalog.lib.kyushu-u.ac.jp
1.1 Background Attacks against software are now major threats. In these attacks, the
sensitive information can be leaked even if underlying cryptographic primitives are secure …

[PDF][PDF] Design and analysis of cryptographic protocols

Y Li - 2016 - hss-opus.ub.ruhr-uni-bochum.de
Cryptographic protocols are a critical element of the infrastructure for secure communication.
They can be used to provide security guarantees for the exchanged data when multiple …