Results 91 to 100 of about 687 (113)
Die sogenannte Wiederbelebung der antiken Architektur in der Renaissance [PDF]
Günther, Hubertus
core
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Myth as a Performance: Lope de Vega’s The Journey of the Soul and the Bivium
Ecumenica, 2023ABSTRACT The Journey of the Soul (El Viaje del Alma) by Lope de Vega has not been studied deeply by scholars. It exemplifies the myth of the bivium, so common in literature throughout history. This article explains the location of Lope de Vega’s play, provides a thematic analysis, and shows its relation to the myth of bivium.
María Montesinos Castañeda
openaire +2 more sources
RFID Authentication Protocol with Enhanced-Bivium
2016 3rd International Conference on Information Science and Control Engineering (ICISCE), 2016RFID (radio frequency identification) is a small electronic device that consists of small chip and an antenna. The biggest challenge for RFID technology is to provide benefits without degrading the secutiry level. This paper proposes a new RFID authentication protocol based on the lightweight stream cipher Enhanced-Bivium.
Shiyong Zhang +2 more
openaire +2 more sources
Optimising Gröbner Bases on Bivium
Mathematics in Computer Science, 2009zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Eibach, Tobias +2 more
openaire +3 more sources
Cube attack on reduced-round Enhanced-Bivium
2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), 2016Trivium is a notable light-weight synchronous stream cipher submitted to the European eSTREAM project in April 2005. Enhanced-Bivium is a reduced version of Trivium which is suitable for RFID system. In this paper, the security of Enhanced-Bivium is concerned under cube attack, which is one of the best known attack on the reduced round Trivium proposed
Shiyong Zhang +2 more
openaire +2 more sources
2010 International Conference on Communications and Intelligence Information Security, 2010
Bivium is a reduced version of the stream cipher Trivium, using 177 stages and only 2 feedback registers. In this paper, we present a cube tester which combines the cube attack with efficient algebraic property-testers. By this method, Bivium was broken with complexity about 2^26 simulations.
Shunbo Li, Yan Wang, Jialong Peng
openaire +2 more sources
Bivium is a reduced version of the stream cipher Trivium, using 177 stages and only 2 feedback registers. In this paper, we present a cube tester which combines the cube attack with efficient algebraic property-testers. By this method, Bivium was broken with complexity about 2^26 simulations.
Shunbo Li, Yan Wang, Jialong Peng
openaire +2 more sources
Distinguishing Attack on Bivium
2010 10th IEEE International Conference on Computer and Information Technology, 2010Bivium is a simplified version of Trivium, a hardware profile finalist of eSTREAM project. Bivium has an internal state of size 177 bits and a key length of 80 bits. In this paper we introduce a distinguishing attack on this cipher. In this method we first find the best linear approximation for the updating function.
Zainab Noferesti +3 more
openaire +2 more sources
Attacking Bivium Using SAT Solvers
International Conference on Theory and Applications of Satisfiability Testing, 2008In this paper we present experimental results of an application of SAT solvers in current cryptography. Trivium is a very promising stream cipher candidate in the final phase of the eSTREAM project. We use the fastest industrial SAT solvers to attack a reduced version of Trivium - called Bivium.
Tobias Eibach +2 more
openaire +2 more sources
Internal State Recovery Attack on Stream Ciphers: Breaking BIVIUM
SPACE, 2019This paper proposes an attack on shift register based stream ciphers. The attack consists of recovering the internal state of the registers at a starting clock instant from which the output stream is available. For a given output stream the evolution of the output function at the clocking times is first computed in symbolic form as a sequence of ...
Shravani Shahapure +2 more
openaire +2 more sources

