Results 91 to 100 of about 687 (113)
Some of the next articles are maybe not open access.

Related searches:

Myth as a Performance: Lope de Vega’s The Journey of the Soul and the Bivium

Ecumenica, 2023
ABSTRACT The Journey of the Soul (El Viaje del Alma) by Lope de Vega has not been studied deeply by scholars. It exemplifies the myth of the bivium, so common in literature throughout history. This article explains the location of Lope de Vega’s play, provides a thematic analysis, and shows its relation to the myth of bivium.
María Montesinos Castañeda
openaire   +2 more sources

RFID Authentication Protocol with Enhanced-Bivium

2016 3rd International Conference on Information Science and Control Engineering (ICISCE), 2016
RFID (radio frequency identification) is a small electronic device that consists of small chip and an antenna. The biggest challenge for RFID technology is to provide benefits without degrading the secutiry level. This paper proposes a new RFID authentication protocol based on the lightweight stream cipher Enhanced-Bivium.
Shiyong Zhang   +2 more
openaire   +2 more sources

Optimising Gröbner Bases on Bivium

Mathematics in Computer Science, 2009
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Eibach, Tobias   +2 more
openaire   +3 more sources

Cube attack on reduced-round Enhanced-Bivium

2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), 2016
Trivium is a notable light-weight synchronous stream cipher submitted to the European eSTREAM project in April 2005. Enhanced-Bivium is a reduced version of Trivium which is suitable for RFID system. In this paper, the security of Enhanced-Bivium is concerned under cube attack, which is one of the best known attack on the reduced round Trivium proposed
Shiyong Zhang   +2 more
openaire   +2 more sources

Cube Testers on Bivium

2010 International Conference on Communications and Intelligence Information Security, 2010
Bivium is a reduced version of the stream cipher Trivium, using 177 stages and only 2 feedback registers. In this paper, we present a cube tester which combines the cube attack with efficient algebraic property-testers. By this method, Bivium was broken with complexity about 2^26 simulations.
Shunbo Li, Yan Wang, Jialong Peng
openaire   +2 more sources

Distinguishing Attack on Bivium

2010 10th IEEE International Conference on Computer and Information Technology, 2010
Bivium is a simplified version of Trivium, a hardware profile finalist of eSTREAM project. Bivium has an internal state of size 177 bits and a key length of 80 bits. In this paper we introduce a distinguishing attack on this cipher. In this method we first find the best linear approximation for the updating function.
Zainab Noferesti   +3 more
openaire   +2 more sources

Attacking Bivium Using SAT Solvers

International Conference on Theory and Applications of Satisfiability Testing, 2008
In this paper we present experimental results of an application of SAT solvers in current cryptography. Trivium is a very promising stream cipher candidate in the final phase of the eSTREAM project. We use the fastest industrial SAT solvers to attack a reduced version of Trivium - called Bivium.
Tobias Eibach   +2 more
openaire   +2 more sources

Internal State Recovery Attack on Stream Ciphers: Breaking BIVIUM

SPACE, 2019
This paper proposes an attack on shift register based stream ciphers. The attack consists of recovering the internal state of the registers at a starting clock instant from which the output stream is available. For a given output stream the evolution of the output function at the clocking times is first computed in symbolic form as a sequence of ...
Shravani Shahapure   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy