نتایج جستجو برای: cube attack
تعداد نتایج: 91114 فیلتر نتایج به سال:
New technologies that take advantage of the emergence massive Internet Things (IoT) and a hyper-connected network environment have rapidly increased in recent years. These are used diverse environments, such as smart factories, digital healthcare, grids, with security concerns. We intend to operate Security Orchestration, Automation Response (SOAR) various environments through new concept defin...
seismic attributes are very useful in seismic data interpretation. one of these attributes is the coherency attribute. seismic coherency is a complex trace and a geometrical attribute that is applied to a 3d cube of seismic data. it is a measure of lateral changes in acoustic impedance caused by the variation in structure, stratigraphy, lithology, porosity, and the presence of hydrocarbons. whe...
recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...
The novel concept of the ET-HMPD, which consists of a Head-Mounted Projection Display (HMPD) with an integrated Eye-Tracking (ET) capability, was recently presented as well as the design of some of its components [Curatu, Hua and Rolland, Proceedings of the SPIE 5875, 2005]. In this paper, we present the overall system design and performance, assuming an ideal cold cube and semi-transparent hot...
در سالهای اخیر بررسی امنیت سومین تابع چکیدهساز امن[1] یکی از مهمترین موضوعات مورد توجه پژوهشگران حوزه رمزنگاری بوده است. توابع چکیدهساز در رمزنگاری کاربردهای متعددی دارند. از اینرو امنیت توابع چکیدهساز در مقابل حملات مختلف برای سامانههایی که از آن استفاده میکنند، بسیار مهم است. حملات و تحلیلهای متعددی تا امروز بر روی SHA-3 اعمال شده است؛ اما تاکنون هیچکدام موفق به شکستن آن بهصورت ...
Coppersmith’s algorithm relies on a simple flaw in the RSA algorithm when messages are small compared to the public number N . Consider a message x encrypted with exponent e = 3 using modulus N for the public key where a < 3 √ N . Then the encryption z of x can be decrypted simply by taking the cube root, because the x operation never rotated x over the modulus N . This is a highly specific cas...
radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید