Results 71 to 80 of about 1,611 (184)

Algebraic Side-Channel Attacks

open access: yes, 2009
In 2002, algebraic attacks using overdefined systems of equa- tions have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convinc- ing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in gen- eral
Renauld, Mathieu   +2 more
openaire   +1 more source

Change Point Analysis for Functional Data Using Empirical Characteristic Functionals

open access: yesJournal of Time Series Analysis, EarlyView.
ABSTRACT We develop a new method to detect change points in the distribution of functional data based on integrated CUSUM processes of empirical characteristic functionals. Asymptotic results are presented under conditions allowing for low‐order moments and serial dependence in the data establishing the limiting null‐distribution of the proposed test ...
Lajos Horváth   +2 more
wiley   +1 more source

Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem

open access: yesIEEE Access, 2019
This paper presents an optimal method for recovering the secret keys of the light encryption device (LED) by combining the impossible differential fault attack with the algebraic differential fault attack. The proposed optimal method effectively improves
Liang Dong   +5 more
doaj   +1 more source

Online Jump and Kink Detection in Segmented Linear Regression: Statistical Optimality Meets Computational Efficiency

open access: yesJournal of Time Series Analysis, EarlyView.
ABSTRACT We consider the problem of sequential (online) estimation of a single change point in a piecewise linear regression model under a Gaussian setup. We demonstrate that certain CUSUM‐type statistics attain the minimax optimal rates for localizing the change point.
Annika Hüselitz, Housen Li, Axel Munk
wiley   +1 more source

Breaking Neural Networks Through Algebraic Lens: A Preliminary Analysis of Mathematical Vulnerabilities in AI Architectures

open access: yesIEEE Access
Modern deep neural networks, particularly transformer architectures, have achieved unprecedented performance across various domains through sophisticated mathematical structures that remain incompletely understood from a security perspective.
Sandeep Gupta   +3 more
doaj   +1 more source

Effective When Distinctive: The Role of Phonetic Similarity in Nested Dependency Learning Across Preschool Years

open access: yesLanguage Learning, EarlyView.
Abstract Parallel tracking of distant relations between speech elements, so‐called nonadjacent dependencies (NADs), is crucial in language development but computationally demanding and acquired only in late preschool years. As processing of single NADs is facilitated when dependent elements are perceptually similar, we investigated how phonetic ...
Dimitra‐Maria Kandia   +3 more
wiley   +1 more source

State recovery attack on ACORN v3 in nonce-reuse setting

open access: yesTongxin xuebao, 2020
Based on differential-algebraic method and guess-and-determine technique,the state recovery attack of ACORN v3 was presented when one pair of key and Nonce was used to encrypt two messages.The time complexity of the attack was 2122.5c,where c was the ...
Guoshuang ZHANG   +3 more
doaj   +2 more sources

Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions

open access: yesIACR Transactions on Symmetric Cryptology
Fully homomorphic encryption (FHE) is an advanced cryptography technique to allow computations (i.e., addition and multiplication) over encrypted data.
Fukang Liu   +3 more
doaj   +1 more source

How Are “Financial Balances” Financed? Wicksell, (Keynes) and the US Mainstream Don't Fit Today's Institutions; Kalecki, Triffin, and Minsky Got it Right

open access: yesMetroeconomica, EarlyView.
ABSTRACT The paper examines the financial balances of the US economy. Government is the main borrower and households and the foreign sector the main lenders. Business net lending is minimal. The balances and their underlying transactions contradict the loanable funds theory and its “global savings glut” variation.
Michalis Nikiforos, Lance Taylor
wiley   +1 more source

In silico modelling of multi‐electrode arrays for enhancing cardiac drug testing on hiPSC‐CM heterogeneous tissues

open access: yesThe Journal of Physiology, EarlyView.
Abstract figure legend Schematic overview of the experimental and computational framework for investigating hiPSC‐CM electrophysiology with MEA systems. The MEA‐based model integrates experimental data with phenotype‐specific ionic models and tissue‐level heterogeneity.
Sofia Botti   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy