نتایج جستجو برای: guess and determine attack

تعداد نتایج: 16846896  

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد گرمسار - دانشکده دامپزشکی 1391

after test and review results and analysis of farm data, the following results were obtained. the review examined farms was done and the results obtained in this study was to determine the effectiveness of vaccines hatchpak avinew (frozen) and hatchpak ib h120 with spray in broilers a day in factories incubation and at least,they can be as vaccines avinew and bioral h120 ability to create saf...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی 1390

abstract u.s. attack to afghanistan after 9/11 provided opportunities for us who tried to become the dominant power after collapse of ussr and bipolar world. thinkers like fukuyama believed american liberal democrats thought would be universally accepted without resistances. liberal democracy is the best and final model of governance; in this regard, united state has moral responsibilities for...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیخ بهایی - دانشکده زبانهای خارجی 1391

the skill of reading in english as a foreign language is an important and challenging one which is affected both by linguistic and extra linguistic factors. since vocabularies are part and parcel of every reading comprehension text, knowing enough vocabulary always facilitates this process. however, guessing strategy as one of the most important strategies has consistently ignored by language l...

پایان نامه :0 1374

in fact, this study focused on the following questions: 1. is there any difference between the effect of functional/notional approach and the structural approaches to language teaching on the proficiency test of efl learners? 2. can a rather innovative language test referred to as "functional test" ge devised so so to measure the proficiency test of efl learners, and thus be as much reliable an...

Journal: :IACR Cryptology ePrint Archive 2007
Andrey Bogdanov

KeeLoq is a block cipher used in numerous widespread passive entry and remote keyless entry systems as well as in various component identification applications. The KeeLoq algorithm has a 64-bit key and operates on 32-bit blocks. It is based on an NLFSR with a nonlinear feedback function of 5 variables. In this paper a key recovery attack with complexity of about 2 steps is proposed (one step i...

Journal: :J. Inf. Sci. Eng. 2014
Jian Zou Wenling Wu Shuang Wu Le Dong

The Grøstl hash function is one of the five finalists in the third round of SHA-3 competition hosted by NIST. In this paper, we propose some improved (pseudo) preimage attacks on the Grøstl hash function by using some techniques, such as subspace preimage attack and the guess-and-determine technique. We present the improved pseudo preimage attacks on 5-round Grøstl-256 hash function and 8-round...

Journal: :IACR transaction on symmetric cryptology 2022

At ASIACRYPT 2012, Sasaki et al. introduced the guess-and-determine approach to extend meet-in-the-middle (MITM) preimage attack. CRYPTO 2021, Dong proposed a technique derive solution spaces of nonlinear constrained neutral words in MITM In this paper, we try combine these two techniques further improve attacks. Based on previous MILP-based automatic tools for attacks, introduce new constraint...

2006
Yung-Cheng Lee

Smart card is a secure device for remote authentication. However, if cardholders lost their card, attackers always can successfully guess passwords and impersonate legal users to login. In 2004, Lee et al. proposed a remote authentication scheme with smart cards. In this paper, we first show that their scheme cannot withstand the guessing attack. If attackers obtain the card, they can successfu...

2014
Riham AlTawy Amr M. Youssef

Whirlwind is a keyless AES-like hash function that adopts the Sponge model. According to its designers, the function is designed to resist most of the recent cryptanalytic attacks. In this paper, we evaluate the second preimage resistance of theWhirlwind hash function. More precisely, we apply a meet in the middle preimage attack on the compression function which allows us to obtain a 5-round p...

2009
Leonie Ruth Simpson Matt Henricksen Wun-She Yap

This paper provides a fresh analysis of the widely-used Common Scrambling Algorithm stream cipher (CSA-SC). Firstly, a new representation of CSA-SC with a state size of only 89 bits is given, a significant reduction from the 103 bit state of a previous CSA-SC representation. Analysis of this 89-bit representation demonstrates that the basis of a previous guess-and-determine attack is flawed. Co...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید