Results 41 to 50 of about 1,691,785 (320)

Enhancing Collision Attacks [PDF]

open access: yes, 2004
Side Channel Attacks (SCA) have received a huge interest in the last 5 years. These new methods consider non-cryptographic sources of information (like timing or power consumption) in addition to traditional techniques. Consequently block ciphers must now resist a variety of SCAs, among which figures the class of “collision attacks”.
Hervé Ledig   +2 more
openaire   +1 more source

REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs [PDF]

open access: yes, 2020
Healthcare institutions require advanced technology to collect patients' data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency.
Al-Zubaidie, Mishall   +2 more
core   +2 more sources

Detection of attack behaviour of pig based on deep learning

open access: yesSystems Science & Control Engineering, 2023
Attack behaviour detection of the pig is a valid method to protect the health of pig. Due to the farm conditions and the illumination changes of the piggery, the images of the pig in the videos are often being overlapped, which lead to difficulties in ...
Yanwen Li   +3 more
doaj   +1 more source

Surface damage evolution of artillery barrel under high-temperature erosion and high-speed impact

open access: yesCase Studies in Thermal Engineering, 2023
Thermochemical erosion and mechanical wear are the primary sources of surface damage in artillery barrel chambers, severely restricting the interior ballistic characteristics and service life of the barrel weapon.
Shuli Li, Liqun Wang, Guolai Yang
doaj   +1 more source

Remote booting in a hostile world: to whom am I speaking? [Computer security] [PDF]

open access: yes, 1995
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders.
Christianson, B., Lomas, M.
core   +1 more source

Security of differential phase shift quantum key distribution against individual attacks [PDF]

open access: yes, 2005
We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks.
C. Bennett   +4 more
core   +1 more source

Hypothesis Testing Based Side-Channel Collision Analysis

open access: yesIEEE Access, 2019
Side-channel collision analysis has become a research hotspot since its first publication in 2003. Compared with differential power analysis (DPA) and correlation power analysis (CPA), collision analysis does not need to know the intermediate value and ...
Dong Zheng, Xiang Jia, Meiling Zhang
doaj   +1 more source

Differential fault analysis on EMV application cryptogram

open access: yes网络与信息安全学报, 2016
The process of application cryptogram in EMV was researched and dummy bits in session key were found.Based on the session key’s dummy bits and compressive property of DES’s Sbox,much information of the application cryptogram master key was got by using ...
Qian PENG, Zeng-ju LI, Ru-hui SHI
doaj   +3 more sources

Near Collision Side Channel Attacks [PDF]

open access: yes, 2016
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar
Barış Ege   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy