نتایج جستجو برای: passive key generation center attack

تعداد نتایج: 1271168  

Journal: :IACR Cryptology ePrint Archive 2011
Masoumeh Safkhani Nasour Bagheri Somitra Kumar Sanadhya Majid Naderi

EPC class 1 Generation 2(or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol known to be insecure. To improve the security of this standard, several protocols have been proposed compliant to this standard. In this paper we analyze the improved Yeh et al. ’s protocol by Yoon which is conforming to EPC-C1 G2 standard and is one ...

In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...

2017
Johannes Blömer Gennadij Liske

We take a critical look at established security definitions for predicate encryption (PE) with public index under chosen-plaintext attack (CPA) and under chosen-ciphertext attack (CCA). In contrast to conventional public-key encryption (PKE), security definitions for PE have to deal with user collusion which is modeled by an additional key generation oracle. We identify three different formaliz...

اسماعیلی , روانبخش, جعفری , هدایت, رهنما , نیلوفر, شفیع پور , ویدا, مختارپور , راضیه, نصیری , ابراهیم,

Background and purpose:Coronary artery disease (CAD) particularly of the acute myocardial infraction (MI) is one of the main causes of mortality in the developing countries. Considering the complication of the disease, the aim of this study was to investigate risk and accelerating factors of heart attack and the reason of the patients' delay in referring to Mazandaran Cardiac Center in 2009. ...

Journal: :IACR Cryptology ePrint Archive 2013
Takanori Isobe Kyoji Shibutani

We propose new generic key recovery attacks on Feistel-type block ciphers. The proposed attack is based on the all subkeys recovery approach presented in SAC 2012, which determines all subkeys instead of the master key. This enables us to construct a key recovery attack without taking into account a key scheduling function. With our advanced techniques, we apply several key recovery attacks to ...

Journal: :journal of computational applied mechanics 0
mohsen azimi m.sc. student, school of mechanical engineering college of engineering, university of tehran, tehran, iran mohammad reza hairi yazdi associate professor, school of mechanical engineering college of engineering, university of tehran, tehran, iran

in this paper an energy dissipation rate control (edrc) method is introduced, which could provide stable walking or running gaits for legged robots. this method is realized by developing a semi-analytical pattern generation approach for a robot during each single support phase (ssp). as yet, several control methods based on passive dynamic walking have been proposed by researchers to provide an...

2004
Radha Poovendran Brian Matt

Poovendran, Corson and Baras presented a distributed cryptographic key generation algorithm that was suitable for wireless networking environment. However, the security as well as the computational complexity of their scheme were never analyzed. In this work, we present information theoretic analysis of their work and derive the properties of the cryptographic keys that are generated by their s...

Journal: :journal of basic and clinical pathophysiology 2013
ali gharibi mohsen khalili zahra kiasalari maryam hoseini rad

abstract background and objective: according to the importance of learning and memory in the human life and also unavoidable neural degeneration due to aging, finding new compounds (drugs) against this process is valuable. however, there are many recommendations for herbal medicine and constituents which encouraged us to examine a candidate plant zingiber officinalis for the mentioned purpose. ...

2015
Ricardo Dahab Steven D. Galbraith Eduardo Morais

In this paper we present adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes. Among such schemes, we study the proposal by Bos et al [BLLN13] in 2013. Given access to a decryption oracle, the attack allows us to compute the private key for all parameter choices. Such attacks show that one must be very careful about the use of homomorphic encryption in practice. T...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید