نتایج جستجو برای: guess and determine attack

تعداد نتایج: 16846896  

Journal: :Tatra Mountains Mathematical Publications 2012

Journal: :IACR Cryptology ePrint Archive 2014
Lin Ding Chenhui Jin Jie Guan Chuanda Qi

By combining the time-memory-data tradeoff (TMDTO) attack independently proposed by Babbage and Golić (BG) with the BSW sampling technique, this paper explores to mount a new TMDTO attack on stream ciphers. The new attack gives a wider variety of trade-offs, compared with original BG-TMDTO attack. It is efficient when multiple data is allowed for the attacker from the same key with different IV...

2013
Ruilin Li Heng Li Chao Li Bing Sun

Abstract. The GMR-1 and GMR-2 stream ciphers, which are used in the satellite phones, have been reconstructed by Driessen et al. recently. The GMR-1 cipher is shown to be a proprietary variant of the GSM A5/2 algorithm, thus it could be cracked using the previous known method. For the newly designed GMR-2 cipher, by observing a non-uniform behavior of its component, Driessen et al. proposed an ...

Journal: :Prikladnaya diskretnaya matematika. Prilozhenie 2018

2018
Alexander Semenov Oleg Zaikin Ilya Otpuschennikov Stepan Kochemazov Alexey Ignatiev

Propositional satisfiability (SAT) is at the nucleus of state-ofthe-art approaches to a variety of computationally hard problems, one of which is cryptanalysis. Moreover, a number of practical applications of SAT can only be tackled efficiently by identifying and exploiting a subset of formula’s variables called backdoor set (or simply backdoors). This paper proposes a new class of backdoor set...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ایلام 1388

the present study was an attempt to determine the types of motivation and levels of foreign language learning anxiety among efl students studying at azad and state universities in kermanshah and to determine the relationship between these two factors and language proficiency and gender. to this end, the foreign language learning motivation scale, by deci and ryan )1985(, were administered to 12...

2005
Joydip Mitra

Stream cipher Hiji-Bij-Bij (HBB) was proposed by Sarkar at Indocrypt’03. This cipher uses cellular automata (CA). The algorithm has two modes: a basic mode (B) and a self-synchronizing mode (SS). This article presents the first attack on B mode of HBB using 128 bit secret key. This is a known-pliantext guess-then-determine attack. The main step in the attack guesses 512 bits of unknown out of t...

Journal: :IACR Cryptology ePrint Archive 2015
Gefei Li Yuval Yarom Damith Chinthana Ranasinghe

Guess-and-determine attacks are based on guessing a subset of internal state bits and subsequently using these guesses together with the cipher’s output function to determine the value of the remaining state. These attacks have been successfully employed to break NFSRbased stream ciphers. The complexity of a guess-and-determine attack is directly related to the number of state bits used in the ...

شیرالی, غلامعباس, افشاری, داود , حسین زاده, طاهر , سعید مرادی, محمد ,

Introduction: Safety signs provide information,related to hazards or dangers in the industry,in form of instructions. These signs are effective as long as they are designed in accordance with principles of ergonomics and design cognitive features. The purpose of this present research was to study the relationship between cognitive features of signs and ability to guess, and to develop the relev...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید