نتایج جستجو برای: passive key generation center attack
تعداد نتایج: 1271168 فیلتر نتایج به سال:
A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore’s attack against RSA with CRT; it consists in inducing a fault modulo p but not modulo q at signature generation step; then by taking a gcd the attacker can recover the factorization of N = pq. The Bellcore attack applies to any encoding ...
Lithium niobate (LiNbO3, LN) devices play critical roles in quantum information processing. However, for special applications like key distribution (QKD), the characteristics of materials and their impact on practical systems must be intensively inquired. For first time, we reveal that photorefractive effect LN can utilized as a potential loophole to carry out malicious attacks by eavesdroppers...
The spring-loaded inverted pendulum (SLIP) is a simple, passivelyelastic two-degree-of-freedom model for legged locomotion that describes the center-of-mass dynamics of many animal species and some legged robots. Conventionally, SLIP models employ a single support leg during stance and, while they can exhibit stable steady gaits when motions are confined to the sagittal plane, threedimensional ...
The spring-loaded inverted pendulum (SLIP) is a simple, passivelyelastic two-degree-of-freedom model for legged locomotion that describes the center-of-mass dynamics of many animal species and some legged robots. Conventionally, SLIP models employ a single support leg during stance and, while they can exhibit stable steady gaits when motions are confined to the sagittal plane, threedimensional ...
In order to keep away from difficulties associated with traditional password based authentication methods, smart card based authentication schemes have been widely used. It has already been accepted worldwide due to its low computational cost. However, most of these schemes are vulnerable to one or the other possible attack. This paper describes a new smart card authentication scheme using symm...
In this paper, we present EPCBC, a lightweight cipher that has 96-bit key size and 48-bit/96-bit block size. This is suitable for Electronic Product Code (EPC) encryption, which uses low-cost passive RFID-tags and exactly 96 bits as a unique identifier on the item level. EPCBC is based on a generalized PRESENT with block size 48 and 96 bits for the main cipher structure and customized key sched...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید