نتایج جستجو برای: guess and determine attack
تعداد نتایج: 16846896 فیلتر نتایج به سال:
building on previous studies on intellectual features and learners’ grammar learning, the present study aimed at investigating whether intelligence criterion had any impact on efl learners’ english grammar learning across two intelligence levels. in the current study, the participants were divided into two experimental and control groups by administration of raven i.q. test. this led to the for...
In this paper, we present several new attacks on multiple encryption block ciphers based on the meet-in-the-middle attack. In the first attack (GDD-MTM), we guess a certain number of secret key bits and apply the meet-in-the-middle attack on multiple ciphertexts. The second attack (TMTO-MTM) is derived from applying the time-memory trade-off attack to the meet-in-the-middle attack on a single c...
objective: the objective of this study was to investigate the invitro fluoride release of four new self-adhesive resin cements; set (sdi, australia), breeze (pentron, usa), embrace wetbond (pulpdent, usa), g-cem (gc, japan) and to assess the bonding performance of these self-adhesive resin cements for bonding of orthodontic brackets. materials and methods: for fluoride release experiment, six ...
fluorescence chemical sensors for the highly sensitive and selective determination of pb2+ , hg2+, co2+ and fe3+ ions in aqueous solutions are described. the ion sensing system was prepared by incorporating lipophilic ligand (l) as a neutral ion-selective fluoroionophore in the plasticized pvc membrane containing sodium tetraphenylborate or potasium tetrakis (p-chlorophenyl) borate as a liphoph...
This paper presents a side-channel timing attack against the MSP430 serial bootstrap loader (BSL), extending a theoretical attack with the details required for a practical implementation. Also investigated is the use of voltage glitching to attack a disabled BSL. 1. SUMMARY The Texas Instruments MSP430 low-power microcontroller is used in many medical, industrial, and consumer devices. It may b...
In a guessing game, players guess the value of a random real number selected using some probability density function. The winner may be determined in various ways; for example, a winner can be a player whose guess is closest in magnitude to the target, or a winner can be a player coming closest without guessing higher than the target. We study optimal strategies for players in these games and d...
There is a growing need to develop lightweight cryptographic primitives suitable for resource-constrained devices permeating in increasing numbers into the fabric of life. Such devices are exemplified none more so than by batteryless radio frequency identification (RFID) tags in applications ranging from automatic identification and monitoring to anti-counterfeiting. Pandaka is a lightweight ci...
BREACH is a side-channel attack to HTTPS that allows an attacker obtain victims’ credentials under certain conditions. An with privileged position on the network can guess character by secret session key just analyzing size of responses returned server over and encrypted. Heal Breach (HTB) proposed technique mitigate randomly changing through modified gzip library. The needs precision one byte ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید