نتایج جستجو برای: guess and determine attack
تعداد نتایج: 16846896 فیلتر نتایج به سال:
Limited distribution notes: This report has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher its distribution outside the University of Technology Chemnitz-Zwickau prior to publication should be limited to peer communications and speciic requests. After outside publication, requests should be lled only by rep...
SCA(Side-channel analysis) is a well-known method to recover the sensitive data stored in security products. Meanwhile numerous countermeasures for hardware implementation of cryptographic algorithms are proposed to protect the internal data against this attack fortunately. However, some designs are not aware that the protection of the plaintext and ciphertext is also crucial. In this work, we ...
Solving systems of nonlinear equations is perhaps one of the most difficult problems in all numerical computation. Although numerous methods have been developed to attack this class of numerical problems, one of the simplest and oldest methods, Newton’s method is arguably the most commonly used. As is well known, the convergence and performance characteristics of Newton’s method can be highly s...
for better management of asthma it is essential that patients adjust their treatment according to the medical plan developed by the health care professionals. to achieve this goal, patients should assess the severity of their disease regularly. the purpose of this study was to determine the effect of regular measurement of peak expiratory flow and patient education on self management of asthma....
We investigate side-channel attacks where the attacker only needs the Hamming weights of several secret exponents to guess a longterm secret. Such weights can often be recovered by SPA, EMA, or simply timing attack. We apply this principle to propose a timing attack on the GPS identification scheme. We consider implementations of GPS where the running time of the exponentiation (commitment phas...
" with a guess to get out, obtain in another way (possibly from a different message) and compare to verify the guess. Past efforts to address guessing attacks in terms of design or analysis always lacked a general definition and a general analysis approach for guessing attacks. Further, they always assumed that the protocols will be implemented without type-flaws and without interaction from ot...
Analyzing network traffic activities is imperative in security to detect attack patterns. Due the complex nature of event caused by continuously changing computing environments and software applications, identifying patterns one challenging research topics. This study focuses on analyzing effectiveness integrating Multi-Resolution Analysis (MRA) visualization activities. In detail, a Discrete W...
This study investigated the utility of all of the above (AOTA) as a test option in multiple-choice items. It aimed at estimating item fit, item difficulty, item discrimination, and guess factor of such a choice. Five reading passages of the Key English Test (KET, 2010) were adapted. The test was reconstructed in 2 parallel forms: Test 1 did not include the abovementioned alternative, whereas Te...
we have two part in this thesis, at first: the interaction of native calf thymus dna (ct-dna) with two anthraquinones including quinizarin (1,4- dihydroxy anthraquinone) and danthron (1,8- dihydroxy anthraquinone) in a mixture of 0.04 m brittone-robinson buffer and 50% of ethanol were studied at physiological ph by uv-vis absorption, florescence, circular dichroism spectroscopic methods, viscos...
the aim of the present study was to determine the in?uence of presence or absence of corpus luteum (cl) on hormonal and metabolites composition of follicular ?uid (ff) harvested from different sized follicles and its relationship with blood serum concentrations in sanjabi ewes. ovaries and blood samples were collected from 60 clinically healthy adult ewes (sanjabi breed) 1–3 years of age in dio...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید