نتایج جستجو برای: passive key generation center attack

تعداد نتایج: 1271168  

Journal: :caspian journal of internal medicine 0
soleiman mahjoub jila masrour roudsari

the metabolic syndrome (ms) recognized as a major cause of type 2 diabetes and cardiovascular diseases, has become one of the major public health challenges worldwide. the pathogenesis of the metabolic syndrome is multiple and still poorly understood. no single factor has yet been identified as an underlying causal factor. there is a growing belief, however, that obesity, specially visceral obe...

حسینی, سید محسن, نوروزیان, رضا,

This paper is introducing a new controlling scheme with second generation wavelet transform and sandia frequency shift (SFS) for islanding detection of inverter-based distributed generation. This new hybrid method combines two active and passive methods through two performance zones. The new hybrid method calculates energy entropy of wavelet coefficients in its passive zone and if it increases ...

2011
Heung Youl YOUM Jung Hwan Song Sun Young Lee

It is further believed that any practical attacks against HyRal are not possible with respect to the state-of-the-art. That is, we conclude that HyRal might be resistant to some well-known analysis such as differential attack, higher order differential attack, linear attack(including Truncated Linear Attack), interpolation attacks, algebraic attack (including XL attack and XSL attack), related ...

1998
Philip Hawkes

Large weak key classes of IDEA are found for which membership is tested with a differential-linear test while encrypting with a single key. In particular, one in every 2'' keys for 8.5-round IDEA is weak. A related-key differential-linear attack on 4-round IDEA is presented which is successful for all keys. Large weak key classes are found for 4.5to 6.5-round and 8-round IDEA for which membersh...

Journal: :journal of advances in computer research 0

binary decision diagram (in short bdd) is an efficient data structure which has been used widely in computer science and engineering. bdd-based attack in key stream cryptanalysis is one of the best forms of attack in its category. in this paper, we propose a new key stream attack which is based on zdd(zero-suppressed bdd). we show how a zdd-based key stream attack is more efficient in time and ...

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

Soleiman Mahjoub, Jila Masrour Roudsari ,

The metabolic syndrome (MS) recognized as a major cause of type 2 diabetes and cardiovascular diseases, has become one of the major public health challenges worldwide. The pathogenesis of the metabolic syndrome is multiple and still poorly understood. No single factor has yet been identified as an underlying causal factor. There is a growing belief, however, that obesity, specially visceral obe...

2004
Håvard Molland Tor Helleseth

In this paper we propose a new key recovery attack on irregular clocked keystream generators where the stream is filtered by a nonlinear Boolean function. We show that the attack is much more efficient than expected from previous analytic methods, and we believe it improves all previous attacks on the cipher model.

2015
Kavita Patil Vidya Chitre

Online data sharing systems and social networks provides security through the cryptographic solutions. For this, Cipher text Policy Attribute Based Encryption is mostly suitable for distributed data sharing systems since the data owner has full control to put in force access policies and updating the policies. Even if the CP-ABE has various advantages, it has a major drawback known as the Key E...

1998
Phong Q. Nguyen Jacques Stern

A well-known cryptographic scenario is the following: a smart card wishes to compute an RSA signature with the help of an untrusted powerful server. Several protocols have been proposed to solve this problem , and many have been broken. There exist two kinds of attacks against such protocols: passive attacks (where the server follows the instructions) and active attacks (where the server may re...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید