نتایج جستجو برای: cube attack

تعداد نتایج: 91114  

Journal: :Philosophical transactions of the Royal Society of London. Series B, Biological sciences 2008
Per E M Siegbahn

The recent finding of a transition state with a significantly lower barrier than previously found, has made the mechanism for O-O bond formation in photosystem II much clearer. The full mechanism can be described in the following way. Electrons and protons are ejected from the oxygen-evolving complex (OEC) in an alternating fashion, avoiding unnecessary build-up of charge. The S0-S1 and S1-S2 t...

Journal: :IACR Cryptology ePrint Archive 2015
Christoph Dobraunig Maria Eichlseder Florian Mendel Martin Schläffer

We present a detailed security analysis of the CAESAR candidate Ascon. Amongst others, cube-like, differential and linear cryptanalysis are used to evaluate the security of Ascon. Our results are practical key-recovery attacks on round-reduced versions of Ascon-128, where the initialization is reduced to 5 out of 12 rounds. Theoretical keyrecovery attacks are possible for up to 6 rounds of init...

2015
Kalikinkar Mandal Yin Tan Teng Wu Guang Gong

The authentication and key generation functions play a significant role to guarantee security and privacy in cellular mobile communications. MILENAGE is a set of authentication and key generation functions proposed by the 3 Generation Partnership Project (3GPP). Most recently, the 3GPP Task Force proposed a new set of authentication and key generation functions, called TUAK, as an alternative f...

2013
Leila Amgoud Henri Prade

The paper presents a parallel between two important theories for the treatment of information which address questions that are apparently unrelated and that are studied by different research communities: an enriched view of formal concept analysis and abstract argumentation. Both theories exploit a binary relation (expressing object-property links, attacks between arguments). We show that when ...

Journal: :TRANSACTIONS OF THE JAPAN SOCIETY OF MECHANICAL ENGINEERS Series B 1999

Journal: :IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2023

Let f be a Boolean function in n variables. The Möbius transform and its converse of can describe the transformation behaviors between truth table coefficients monomials algebraic normal form representation f. In this letter, we develop into more generalized form, which also includes known result given by Reed 1954. We hope that our new used design decoding schemes for linear codes cryptanalysi...

Journal: :International Journal of Computer Games Technology 2011

2017
Richard Polfreman Benjamin Oliver

2017 marks the 40 anniversary of the Rubik’s Cube (under its original name the Magic Cube). This paper-demonstration describes explorations of the cube as a performance controller for music. The pattern of colors on a face of the cube is detected via USB video camera and supplemented by EMG data from the performer to model the performer’s interaction with the cube. This system was trialed in a ...

Journal: :Journal of Cryptology 2021

A division property is a generic tool to search for integral distinguishers, and automatic tools such as MILP or SAT/SMT allow us evaluate the propagation efficiently. In application stream ciphers, it enables estimate security of cube attacks theoretically, leads best key-recovery against well-known ciphers. However, was reported that some based on degenerate distinguishing due inaccuracy prop...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید