نتایج جستجو برای: cube attack

تعداد نتایج: 91114  

Journal: :Computers, materials & continua 2022

New technologies that take advantage of the emergence massive Internet Things (IoT) and a hyper-connected network environment have rapidly increased in recent years. These are used diverse environments, such as smart factories, digital healthcare, grids, with security concerns. We intend to operate Security Orchestration, Automation Response (SOAR) various environments through new concept defin...

Journal: :فیزیک زمین و فضا 0
علی هاشمی گازار کارشناس ارشد ژئوفیزیک، گروه فیزیک زمین، مؤسسة ژئوفیزیک دانشگاه تهران، ایران عبدالرحیم جواهریان استاد بازنشسته، گروه فیزیک زمین، مؤسسه ژئوفیزیک، دانشگاه تهران و استاد دانشکده مهندسی نفت دانشگاه صنعتی امیرکبیر، تهران، ایران

seismic attributes are very useful in seismic data interpretation. one of these attributes is the coherency attribute. seismic coherency is a complex trace and a geometrical attribute that is applied to a 3d cube of seismic data. it is a measure of lateral changes in acoustic impedance caused by the variation in structure, stratigraphy, lithology, porosity, and the presence of hydrocarbons. whe...

Journal: :isecure, the isc international journal of information security 0
m. safkhani computer engineering department, shahid rajaee teacher training university, tehran, iran n. bagheri electrical engineering department, shahid rajaee teacher training university, tehran, iran

recently, baghery et al. [1, 2] presented some attacks on two rfid protocols, namely yoon and jung et al. protocols, and proposed the improved version of them. however, in this note, we show that the improved version of the jung et al. protocol suffers from desynchronization attack and the improved version of the yoon's protocol suffers from secret disclosure attack. the success probabilit...

2006
Costin Curatu Hong Hua Jannick Rolland

The novel concept of the ET-HMPD, which consists of a Head-Mounted Projection Display (HMPD) with an integrated Eye-Tracking (ET) capability, was recently presented as well as the design of some of its components [Curatu, Hua and Rolland, Proceedings of the SPIE 5875, 2005]. In this paper, we present the overall system design and performance, assuming an ideal cold cube and semi-transparent hot...

در سال‌های اخیر بررسی امنیت سومین تابع چکیده‌ساز امن[1] یکی از مهم‌ترین موضوعات مورد توجه پژوهش­گران حوزه رمزنگاری بوده ‌است. توابع چکیده‌ساز در رمزنگاری کاربردهای متعددی دارند. از این­رو امنیت توابع چکیده‌ساز در مقابل حملات مختلف برای سامانه‌هایی که از آن استفاده می‌کنند، بسیار مهم است. حملات و تحلیل‌های متعددی تا امروز بر روی SHA-3 اعمال شده ‌است؛ اما تاکنون هیچ­کدام موفق به شکستن آن به‌صورت ...

Journal: :Theoretical Computer Science 2003

2003
Jason Dyer

Coppersmith’s algorithm relies on a simple flaw in the RSA algorithm when messages are small compared to the public number N . Consider a message x encrypted with exponent e = 3 using modulus N for the public key where a < 3 √ N . Then the encryption z of x can be decrypted simply by taking the cube root, because the x operation never rotated x over the modulus N . This is a highly specific cas...

Journal: :isecure, the isc international journal of information security 0
s. sajjadi ghaemmaghami department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran a. haghbin department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran m. mirmohseni department of electrical engineering, sharif university of technology, tehran, iran

radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...

Journal: :European Journal of Combinatorics 2010

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید