Results 71 to 80 of about 1,200 (188)
Algebraic side‐channel attacks on Trivium stream cipher
Algebraic Side‐Channel Attacks (ASCAs), first proposed by Renauld and Standaert in 2009, are a potent cryptanalysis method against block ciphers. In this paper, the authors initially utilize ASCAs to analyze the security of the Trivium stream cipher ...
Wenlong Sun, Jie Guan
doaj +1 more source
Attack Tree Metrics are Operad Algebras
Attack Trees (ATs) are a widely used tool for security analysis. ATs can be employed in quantitative security analysis through metrics, which assign a security value to an AT. Many different AT metrics exist, and there exist multiple general definitions that aim to study a wide variety of AT metrics at once.
openaire +3 more sources
ABSTRACT Lucid dreaming, defined as the experience of becoming aware of dreaming while dreaming, offers a unique window into a state of consciousness characterised by a blending of the sensory vividness of REM sleep with the self‐awareness of wakefulness. While past functional imaging has shed light on the neural activity supporting lucid dreaming, the
Nicola De Pisapia +4 more
wiley +1 more source
Fast Algebraic Immunity of
Boolean functions should possess high fast algebraic immunity (FAI) when it is used in stream ciphers in order to stand up to fast algebraic attacks. However, in previous research, the FAI of Boolean functions was usually calculated by computer.
Yindong Chen +3 more
doaj +1 more source
Algebraic Side-Channel Attacks
In 2002, algebraic attacks using overdefined systems of equa- tions have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However, although a number of convinc- ing experiments have been performed against certain reduced algorithms, it is not clear whether these attacks can be successfully applied in gen- eral
Renauld, Mathieu +2 more
openaire +1 more source
Change Point Analysis for Functional Data Using Empirical Characteristic Functionals
ABSTRACT We develop a new method to detect change points in the distribution of functional data based on integrated CUSUM processes of empirical characteristic functionals. Asymptotic results are presented under conditions allowing for low‐order moments and serial dependence in the data establishing the limiting null‐distribution of the proposed test ...
Lajos Horváth +2 more
wiley +1 more source
Unboxing ARX-Based White-Box Ciphers: Chosen-Plaintext Computation Analysis and Its Applications
It has been proven that the white-box ciphers with small encodings will be vulnerable to algebraic and computation attacks. By leveraging the large encodings, the self-equivalence and implicit implementations are proposed for ARXbased white-box ciphers.
Yufeng Tang +4 more
doaj +1 more source
Algebraic fault attack on PRESENT
A new fault analysis method on PRESENT—algebraic fault attack was proposed.This attack combined conventional algebraic cryptanalysis with fault attack,firstly built equivalent Boolean algebraic equations of cipher encryption by algebraic cryptanalysis method; secondly got information of fault cryptograph by fault attack technique,and transformed ...
Ke-hui WU +4 more
openaire +2 more sources
ABSTRACT We consider the problem of sequential (online) estimation of a single change point in a piecewise linear regression model under a Gaussian setup. We demonstrate that certain CUSUM‐type statistics attain the minimax optimal rates for localizing the change point.
Annika Hüselitz, Housen Li, Axel Munk
wiley +1 more source
Abstract Parallel tracking of distant relations between speech elements, so‐called nonadjacent dependencies (NADs), is crucial in language development but computationally demanding and acquired only in late preschool years. As processing of single NADs is facilitated when dependent elements are perceptually similar, we investigated how phonetic ...
Dimitra‐Maria Kandia +3 more
wiley +1 more source

