نتایج جستجو برای: attack resistance

تعداد نتایج: 452323  

Journal: :J. Electronic Imaging 2007
Chang-Tsun Li Huayin Si

In this work, we propose a novel fragile watermarking scheme in wavelet transform domain, which is sensitive to all kinds of manipulations and has the ability to localize the tampered regions. To achieve high transparency (i.e., low embedding distortion) while providing protection to all coefficients, the embedder involves all the coefficients within a hierarchical neighborhood of each sparsely...

2015
Ran Li Jin Zhang Jiancai Li Guoxin Zhou Qi Wang Wenbo Bian Matthias Erb Yonggen Lou

Plants generally respond to herbivore attack by increasing resistance and decreasing growth. This prioritization is achieved through the regulation of phytohormonal signaling networks. However, it remains unknown how this prioritization affects resistance against non-target herbivores. In this study, we identify WRKY70 as a specific herbivore-induced, mitogen-activated protein kinase-regulated ...

2012
Rozenn Thomas Stéphan Jacquet Nigel Grimsley Hervé Moreau

Surviving viral attack is essential for any species to avoid its irreversible removal from the ecosystem, and microbes must involve the resistance or susceptibility of individual cells. The co-existence between viruses and their hosts has led to the evolution of complex viral attack and host defence strategies. We review the state of the art about our understanding of resistance to viruses in a...

2004
Mridul Nandi

In this paper we constructed a class of double length hash functions which are maximally secure i.e. the birthday attack is the best possible attack. Recently, Joux [6] in Crypto-04 showed a multicollision attack on the classical iterated hash function which can be used to get the collision on the concatenated double length hash functions. Very recently, Lucks [10] also designed a double-pipe h...

Journal: :IACR Cryptology ePrint Archive 2006
Donghoon Chang

Parallel FFT-Hashing was designed by C. P. Schnorr and S. Vaudenay in 1993. The function is a simple and light weight hash algorithm with 128-bit digest. Its basic component is a multi-permutation which helps in proving its resistance to collision attacks. In this work we show a preimage attack on Parallel FFT-Hashing with complexity 2 + 2 and memory 2 which is less than the generic complexity ...

2000
Glenn Durfee Phong Q. Nguyen

At Asiacrypt ’99, Sun, Yang and Laih proposed three RSA variants with short secret exponent that resisted all known attacks, including the recent Boneh-Durfee attack from Eurocrypt ’99 that improved Wiener’s attack on RSA with short secret exponent. The resistance comes from the use of unbalanced primes p and q. In this paper, we extend the Boneh-Durfee attack to break two out of the three prop...

Journal: :IACR Cryptology ePrint Archive 2004
Helmut Kahl

This note describes an SPA-based side channel attack against a CRT implementation of an RSA function. In contrast with Novak’s attack [8], it concentrates on the initial modular reduction. With the help of lattice reduction it applies even to implementations which use a common randomising technique to ensure resistance against certain side channel attacks.

Journal: :IEICE Transactions 2005
Dong-Wook Lee Dong-Soo Har

Cryptosystems for smartcard are required to provide protection from Differential Power Analysis (DPA) attack. Self-timed circuit based cryptosystems demonstrate considerable resistance against DPA attack, but they take substantial circuit area. A novel approach offering up to 30% area reduction and maintaining DPA protection level close to DIMS scheme is proposed. key words: DPA, self-timed cir...

2007
RICHARD HESLIN

Inoculation techniques from social psychological theory were opplied to a controversial issue in a marketing context. Experimental factors were type of defense, time intervol between defense and attack, and credibility of the attacker. In general, predictions from inoculation theory were confirmed: all defenses conferred resistance to attack; the refutational defense was superior to the direct ...

2013
Li Wang Yanyan Pei Biao Lian Weili Wu Xueqi Cheng Wenming Ma Yujie Zhang Mehran Abolhasan Xiaoyan Shen Chenjiang Xie Haoxue Liu Zhaowen Qiu Dianfu Ma Yang Yang Biaobiao Shi Bo Jiang Jing Li Shupeng Zhao Miao Tian Shifang Zhang Xiaoxia Niu Yanxia Wu Bowei Zhang Guochang Gu Guoyin Zhang Zhengyi Tang

Recently proposed algebraic attack has been shown to be very effective on several stream ciphers. In this paper, we have investigated the resistance of PingPong family of stream ciphers against algebraic attacks. This stream cipher was proposed in 2008 to enhance the security of the improved summation generator. In particular, we focus on the PingPong-128 stream cipher’s resistance against alge...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید