Results 41 to 50 of about 1,782,571 (254)

Nuclear dimension and Z-stability of non-simple C*-algebras [PDF]

open access: yes, 2014
We investigate the interplay of the following regularity properties for non-simple C*-algebras: finite nuclear dimension, Z-stability, and algebraic regularity in the Cuntz semigroup.
Robert, Leonel, Tikuisis, Aaron
core   +1 more source

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Algebraic Attacks on RFID Protocols [PDF]

open access: yes, 2009
This work aims to identify the algebraic problems which enable many attacks on RFID protocols. Toward this goal, three emerging types of attacks on RFID protocols, concerning authentication, untraceability, and secrecy are discussed. We demonstrate the types of attacks by exhibiting previously unpublished vulnerabilities in several protocols and ...
van Deursen, Ton, Radomirović, Saša
openaire   +2 more sources

A polynomial time attack against algebraic geometry code based public key cryptosystems [PDF]

open access: yes2014 IEEE International Symposium on Information Theory, 2014
We give a polynomial time attack on the McEliece public key cryptosystem based on algebraic geometry codes. Roughly speaking, this attacks runs in O(n4) operations in Fq, where n denotes the code length.
Alain Couvreur   +2 more
semanticscholar   +1 more source

Chosen-IV Algebraic Attack on Randomized Ciphers FASTA and HERA

open access: yesIACR Transactions on Symmetric Cryptology
Fully homomorphic encryption (FHE) enables computation on encrypted data without decryption, providing strong guarantees for privacy-preserving applications.
Fukang Liu   +6 more
doaj   +1 more source

Comparative Study of Algebraic Attacks

open access: yesIARJSET, 2016
Cryptographic schemes have an algebraic structure and can be described as multivariate polynomial equations. Even though algebra is the default tool in the cryptanalysis of asymmetric cryptosystems, there has been recently an increase in interest in the use of algebraic cryptanalysis techniques in the analysis of symmetric cryptosystems. The basic idea
Ahmed A Abdel-Hafez   +2 more
openaire   +1 more source

A Thermodynamic 3D Model for the Simulation of Diffusion‐Controlled Alloying Processes in Heterogeneous Material Structures

open access: yesAdvanced Engineering Materials, EarlyView.
A numerical model resulting from irreversible thermodynamics for describing transport processes is introduced, focusing on thermodynamic activity gradients as the actual driving force for diffusion. Implemented in CUDA C++ and using CalPhaD methods for determining the necessary activity data, the model accurately simulates interdiffusion in aluminum ...
Ulrich Holländer   +3 more
wiley   +1 more source

Belief Propagation Meets Lattice Reduction: Security Estimates for Error-Tolerant Key Recovery from Decryption Errors

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
In LWE-based KEMs, observed decryption errors leak information about the secret key in the form of equations or inequalities. Several practical fault attacks have already exploited such leakage by either directly applying a fault or enabling a chosen ...
Julius Hermelink   +4 more
doaj   +1 more source

Defeating the Ben-Zvi, Blackburn, and Tsaban Attack on the Algebraic Eraser [PDF]

open access: yes, 2016
The Algebraic Eraser Diffie-Hellman (AEDH) protocol was introduced in 2005 and published in 2006 by Anshel-Anshel-Goldfeld-Lemieux as a protocol suitable for use on platforms with constrained computational resources, such as FPGAs, ASICs, and wireless ...
Anshel, Iris   +3 more
core   +1 more source

Labeled binary planar trees and quasi-Lie algebras

open access: yes, 2009
We study the natural map eta between a group of binary planar trees whose leaves are labeled by elements of a free abelian group H and a certain group D(H) derived from the free Lie algebra over H.
Garoufalidis   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy