Passive attack

A passive attack on a cryptosystem is one in which the cryptanalyst cannot interact with any of the parties involved, attempting to break the system… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1995-2018
05101519952018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Sensor nodes collect the data from the environment and send to sink. But attackers corrupt data while transmitting therefore data… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
2013
2013
In this paper, we report extremely fast and optimised active and passive attacks against the old IEEE 802.11 wireless… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2012
2012
The mobile agent has been seen as a promising distributed computing technology. The mobility characteristic of mobile agent makes… (More)
  • figure I
  • figure 2
Is this relevant?
2011
2011
The secrecy throughput of mobile ad hoc networks (MANETs) with malicious nodes is investigated. The MANET consists of <i>n</i… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 4
  • figure 6
Is this relevant?
2008
2008
We present a very simple probabilistic, passive attack against the protocols HB and HB. Our attack presents some interesting… (More)
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
2008
2008
HB and HB+ are a shared secret-key authentication protocols designed for low-cost devices such as RFID tags. HB+ was proposed by… (More)
  • figure 1
  • table 1
  • figure 2
  • table 2
Is this relevant?
2007
2007
Side-channel attacks have been deeply studied for years to ensure the tamper resistance of embedded implementations. Analysis are… (More)
  • figure 1
  • figure 2
  • figure 5
  • figure 3
Is this relevant?
2007
2007
In this paper, we present a passive attack for finding out the secrets used in MAP (Minimalist Mutual Authentication Protocol… (More)
  • table 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We implemented an attack against WEP, the link-layer security protocol for 802.11 networks. The attack was described in a recent… (More)
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Power analysis is a very successful cryptanalytic technique which extracts secret information from smart cards by analysing the… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?