Results 1 to 10 of about 811,171 (213)
Combined Side Channel Attacks: breaking COMP128
Different variants of combined side channel attacks (SCA) on authentication protocol COMP128 are analyzed in the article, paper. Main attack presented in the paper is partitioning attack.
Alla Borisovna Levina +1 more
doaj +1 more source
Chosen Plaintext Combined Attack against SM4 Algorithm
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key.
Jintao Rao, Zhe Cui
doaj +1 more source
Video Watermarking Algorithm Based on NSCT, Pseudo 3D-DCT and NMF
Video watermarking is an important means of video and multimedia copyright protection, but the current watermarking algorithm is difficult to ensure high robustness under various attacks.
Di Fan +4 more
doaj +1 more source
Generic Attacks on Hash Combiners [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bao, Zhenzhen +4 more
openaire +3 more sources
VERICA - Verification of Combined Attacks
Physical attacks, including passive Side-Channel Analysis and active Fault Injection Analysis, are considered among the most powerful threats against physical cryptographic implementations. These attacks are well known and research provides many specialized countermeasures to protect cryptographic implementations against them.
Jan Richter-Brockmann +3 more
openaire +4 more sources
Research on Java card security
To protect privacy and the safety of property,the security research of Java card was proposed.On the basis of systematically discussing the basic composition of Java card,the key of attacking methods were summarized,including logical attack,fault ...
Xue-lian ZHANG,Zhen WU,Zhi-bo DU,Min WANG,Chun-ling XIANG
doaj +3 more sources
Factors associated with the time to next attack in neuromyelitis optica: accelerated failure time models with random effects. [PDF]
BACKGROUND AND OBJECTIVE: Neuromyelitis optica (NMO) is an inflammatory demyelinating disorder of the central nervous system with a relapsing and remitting course. We aimed to identify factors associated with the time to next attack, including the effect
Sung-Min Kim +7 more
doaj +1 more source
Concrete structures suffer serious deterioration under a corrosive environment. Consequently, the service life of these concrete structures is decreased and deteriorates under combined attack of sulphate and chlorides.
Safiel Tumaini Chambua +2 more
doaj +1 more source
A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps
We study the success probabilities of two variants of Correlation Power Analysis (CPA) to retrieve multiple secret bits. The target is a permutation-based symmetric cryptographic construction with a quadratic map as an S-box. More precisely, we focus on
Anna Guinet +3 more
doaj +1 more source
Dynamic Traitor Tracing Schemes, Revisited [PDF]
We revisit recent results from the area of collusion-resistant traitor tracing, and show how they can be combined and improved to obtain more efficient dynamic traitor tracing schemes.
Laarhoven, Thijs
core +3 more sources

