نتایج جستجو برای: guess and determine attack

تعداد نتایج: 16846896  

پایان نامه :وزارت علوم، تحقیقات و فناوری - پژوهشگاه دانشهای بنیادی (مرکز تحقیقات فیزیک نظری و 1387

we show that when both sources ( lepton flavor violation sources and cp-violating phases) are present, the electric dipole moment of the electron, $d_e$, receives a contribution from the phase of the trilinear $a$-term of staus, $phi_{a_ au}$. for $phi_{a_ au}=pi/2$, the value of $d_e$, depending on the ratios of the lfv mass elements, can range between zero and three orders of magnitude a...

Journal: :IEEE Access 2022

In this paper, we propose and evaluate a method for generating key-dependent feedback configurations (KDFC) $\sigma $ -LFSRs. -LFSRs with such can be applied to any stream cipher that uses word-based LFSR. Here, configuration generation algorithm the secret key(K) Initialization Vector (IV) gener...

2007
Andrey Bogdanov

KeeLoq is a block cipher used in numerous widespread passive entry and remote keyless entry systems as well as in various component identification applications. The KeeLoq algorithm has a 64-bit key and operates on 32-bit blocks. It is based on an NLFSR with a nonlinear feedback function of 5 variables. In this paper new key recovery attacks on KeeLoq are proposed. The first one has a complexit...

Journal: :International journal of advanced research 2021

To guard ourselves against a word attack or breach, it is always important to have an awareness of the unremarkably used sorts attacks. The most common type password guessing. Hackers can guess passwords locally remotely using either manually through automated approach. One such Dictionary Attack. A dictionary tries make authentication mechanism fail by sequentially entering each in as trying f...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم انسانی 1389

abstract in a protocol analysis of second language writing from 20 adult english as a foreign language (efl) iranian students, this research observed how language-switching (l-s), i.e., first language use in l2 writing, was affected by l2 proficiency. switching interactively between first (l1) and second (l2) languages has been recognized as one of the salient characteristics of l2 writing....

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت معلم تهران - دانشکده علوم 1372

in this study reference as one of the five cohesive devices in the achievement of textuality in english and persian narrative/descripitive written texts is focused on and analysed . to do so , the theoretical framework elaborated by halliday and hasan (1976) and its version adapted by the writer to match the sub-types of reference in farsi are applied to the analysis of reference in english and...

Journal: :IACR Cryptology ePrint Archive 2011
Charles Bouillaguet Patrick Derbez Pierre-Alain Fouque

In this paper, we describe versatile and powerful algorithms for searching guess-and-determine and meet-in-the-middle attacks on byte-oriented symmetric primitives. To demonstrate the strengh of these tool, we show that they allows to automatically discover new attacks on round-reduced AES with very low data complexity, and to find improved attacks on the AES-based MACs Alpha-MAC and Pelican-MA...

پایان نامه :دانشگاه آزاد اسلامی واحد کرمانشاه - پژوهشکده زبان و گویش 1393

abstract the purpose of this study is twofold: on the one hand, it is intended to see what kind of noticing-the –gap activity (teacher generated vs. learner generated) is more efficient in teaching l2 grammar in classroom language learning. on the other hand, it is an attempt to determine which approach of the noticing-the-gap- activity is more effective in the long- term retention of grammar...

پایان نامه :0 1374

in fact this study is concerned with the relationship between the variation in thematice structure and the comprehension of spoken language. so the study focused on the following questions: 1. is there any relationship between thematic structure and the comprehension of spoken language? 2. which of the themes would have greated thematic force and be easier for the subjects to comprehend? accord...

2013
Yu Sasaki Yang Li Hikaru Sakamoto Kazuo Sakiyama

In this paper, we propose a new technique for Square Differential Fault Analysis (DFA) against AES that can recover a secret key even with a large number of noisy fault injections, while the previous approaches of the Square DFA cannot work with noise. This makes the attack more realistic because assuming the 100% accuracy of obtaining intended fault injections is usually impossible. Our succes...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید