نتایج جستجو برای: passive key generation center attack
تعداد نتایج: 1271168 فیلتر نتایج به سال:
EPC class 1 Generation 2(or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol known to be insecure. To improve the security of this standard, several protocols have been proposed compliant to this standard. In this paper we analyze the improved Yeh et al. ’s protocol by Yoon which is conforming to EPC-C1 G2 standard and is one ...
In cloud computing, multiple users can share the same physical machine that can potentially leak secret information, in particular when the memory de-duplication is enabled. Flush+Reload attack is a cache-based attack that makes use of resource sharing. T-table implementation of AES is commonly used in the crypto libraries like OpenSSL. Several Flush+Reload attacks on T-table implementat...
We take a critical look at established security definitions for predicate encryption (PE) with public index under chosen-plaintext attack (CPA) and under chosen-ciphertext attack (CCA). In contrast to conventional public-key encryption (PKE), security definitions for PE have to deal with user collusion which is modeled by an additional key generation oracle. We identify three different formaliz...
Background and purpose:Coronary artery disease (CAD) particularly of the acute myocardial infraction (MI) is one of the main causes of mortality in the developing countries. Considering the complication of the disease, the aim of this study was to investigate risk and accelerating factors of heart attack and the reason of the patients' delay in referring to Mazandaran Cardiac Center in 2009. ...
We propose new generic key recovery attacks on Feistel-type block ciphers. The proposed attack is based on the all subkeys recovery approach presented in SAC 2012, which determines all subkeys instead of the master key. This enables us to construct a key recovery attack without taking into account a key scheduling function. With our advanced techniques, we apply several key recovery attacks to ...
in this paper an energy dissipation rate control (edrc) method is introduced, which could provide stable walking or running gaits for legged robots. this method is realized by developing a semi-analytical pattern generation approach for a robot during each single support phase (ssp). as yet, several control methods based on passive dynamic walking have been proposed by researchers to provide an...
Poovendran, Corson and Baras presented a distributed cryptographic key generation algorithm that was suitable for wireless networking environment. However, the security as well as the computational complexity of their scheme were never analyzed. In this work, we present information theoretic analysis of their work and derive the properties of the cryptographic keys that are generated by their s...
abstract background and objective: according to the importance of learning and memory in the human life and also unavoidable neural degeneration due to aging, finding new compounds (drugs) against this process is valuable. however, there are many recommendations for herbal medicine and constituents which encouraged us to examine a candidate plant zingiber officinalis for the mentioned purpose. ...
In this paper we present adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes. Among such schemes, we study the proposal by Bos et al [BLLN13] in 2013. Given access to a decryption oracle, the attack allows us to compute the private key for all parameter choices. Such attacks show that one must be very careful about the use of homomorphic encryption in practice. T...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید