نتایج جستجو برای: passive key generation center attack

تعداد نتایج: 1271168  

2009
Jean-Sébastien Coron Avradip Mandal

A fault attack consists in inducing hardware malfunctions in order to recover secrets from electronic devices. One of the most famous fault attack is Bellcore’s attack against RSA with CRT; it consists in inducing a fault modulo p but not modulo q at signature generation step; then by taking a gcd the attacker can recover the factorization of N = pq. The Bellcore attack applies to any encoding ...

2003
Matthew K. Wright Micah Adler Brian Neil Levine Clay Shields

Journal: :Science China Information Sciences 2018

Journal: :Physical review applied 2023

Lithium niobate (LiNbO3, LN) devices play critical roles in quantum information processing. However, for special applications like key distribution (QKD), the characteristics of materials and their impact on practical systems must be intensively inquired. For first time, we reveal that photorefractive effect LN can utilized as a potential loophole to carry out malicious attacks by eavesdroppers...

2006
Justin Seipel Philip Holmes

The spring-loaded inverted pendulum (SLIP) is a simple, passivelyelastic two-degree-of-freedom model for legged locomotion that describes the center-of-mass dynamics of many animal species and some legged robots. Conventionally, SLIP models employ a single support leg during stance and, while they can exhibit stable steady gaits when motions are confined to the sagittal plane, threedimensional ...

Journal: :I. J. Robotics Res. 2006
Justin E. Seipel Philip Holmes

The spring-loaded inverted pendulum (SLIP) is a simple, passivelyelastic two-degree-of-freedom model for legged locomotion that describes the center-of-mass dynamics of many animal species and some legged robots. Conventionally, SLIP models employ a single support leg during stance and, while they can exhibit stable steady gaits when motions are confined to the sagittal plane, threedimensional ...

2013
Ravi Singh Pippal Pradeep Gupta Rakesh Singh

In order to keep away from difficulties associated with traditional password based authentication methods, smart card based authentication schemes have been widely used. It has already been accepted worldwide due to its low computational cost. However, most of these schemes are vulnerable to one or the other possible attack. This paper describes a new smart card authentication scheme using symm...

2011
Huihui Yap Khoongming Khoo Axel Poschmann Matt Henricksen

In this paper, we present EPCBC, a lightweight cipher that has 96-bit key size and 48-bit/96-bit block size. This is suitable for Electronic Product Code (EPC) encryption, which uses low-cost passive RFID-tags and exactly 96 bits as a unique identifier on the item level. EPCBC is based on a generalized PRESENT with block size 48 and 96 bits for the main cipher structure and customized key sched...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید