Results 71 to 80 of about 1,611 (184)
Algebraic Side-Channel Attacks
In 2002, algebraic attacks using overdefined systems of equa- tions have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convinc- ing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in gen- eral
Renauld, Mathieu +2 more
openaire +1 more source
Change Point Analysis for Functional Data Using Empirical Characteristic Functionals
ABSTRACT We develop a new method to detect change points in the distribution of functional data based on integrated CUSUM processes of empirical characteristic functionals. Asymptotic results are presented under conditions allowing for low‐order moments and serial dependence in the data establishing the limiting null‐distribution of the proposed test ...
Lajos Horváth +2 more
wiley +1 more source
Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem
This paper presents an optimal method for recovering the secret keys of the light encryption device (LED) by combining the impossible differential fault attack with the algebraic differential fault attack. The proposed optimal method effectively improves
Liang Dong +5 more
doaj +1 more source
ABSTRACT We consider the problem of sequential (online) estimation of a single change point in a piecewise linear regression model under a Gaussian setup. We demonstrate that certain CUSUM‐type statistics attain the minimax optimal rates for localizing the change point.
Annika Hüselitz, Housen Li, Axel Munk
wiley +1 more source
Modern deep neural networks, particularly transformer architectures, have achieved unprecedented performance across various domains through sophisticated mathematical structures that remain incompletely understood from a security perspective.
Sandeep Gupta +3 more
doaj +1 more source
Abstract Parallel tracking of distant relations between speech elements, so‐called nonadjacent dependencies (NADs), is crucial in language development but computationally demanding and acquired only in late preschool years. As processing of single NADs is facilitated when dependent elements are perceptually similar, we investigated how phonetic ...
Dimitra‐Maria Kandia +3 more
wiley +1 more source
State recovery attack on ACORN v3 in nonce-reuse setting
Based on differential-algebraic method and guess-and-determine technique,the state recovery attack of ACORN v3 was presented when one pair of key and Nonce was used to encrypt two messages.The time complexity of the attack was 2122.5c,where c was the ...
Guoshuang ZHANG +3 more
doaj +2 more sources
Algebraic Attack on FHE-Friendly Cipher HERA Using Multiple Collisions
Fully homomorphic encryption (FHE) is an advanced cryptography technique to allow computations (i.e., addition and multiplication) over encrypted data.
Fukang Liu +3 more
doaj +1 more source
ABSTRACT The paper examines the financial balances of the US economy. Government is the main borrower and households and the foreign sector the main lenders. Business net lending is minimal. The balances and their underlying transactions contradict the loanable funds theory and its “global savings glut” variation.
Michalis Nikiforos, Lance Taylor
wiley +1 more source
Abstract figure legend Schematic overview of the experimental and computational framework for investigating hiPSC‐CM electrophysiology with MEA systems. The MEA‐based model integrates experimental data with phenotype‐specific ionic models and tissue‐level heterogeneity.
Sofia Botti +2 more
wiley +1 more source

