Results 1 to 10 of about 811,171 (213)

Combined Side Channel Attacks: breaking COMP128

open access: yesБезопасность информационных технологий, 2014
Different variants of combined side channel attacks (SCA) on authentication protocol COMP128 are analyzed in the article, paper. Main attack presented in the paper is partitioning attack.
Alla Borisovna Levina   +1 more
doaj   +1 more source

Chosen Plaintext Combined Attack against SM4 Algorithm

open access: yesApplied Sciences, 2022
The SM4 algorithm is widely used to ensure the security of data transmission. The traditional chosen plaintext power attacks against SM4 usually need to analyze four rounds power traces in turn to recover the secret key.
Jintao Rao, Zhe Cui
doaj   +1 more source

Video Watermarking Algorithm Based on NSCT, Pseudo 3D-DCT and NMF

open access: yesSensors, 2022
Video watermarking is an important means of video and multimedia copyright protection, but the current watermarking algorithm is difficult to ensure high robustness under various attacks.
Di Fan   +4 more
doaj   +1 more source

Generic Attacks on Hash Combiners [PDF]

open access: yesJournal of Cryptology, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bao, Zhenzhen   +4 more
openaire   +3 more sources

VERICA - Verification of Combined Attacks

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
Physical attacks, including passive Side-Channel Analysis and active Fault Injection Analysis, are considered among the most powerful threats against physical cryptographic implementations. These attacks are well known and research provides many specialized countermeasures to protect cryptographic implementations against them.
Jan Richter-Brockmann   +3 more
openaire   +4 more sources

Research on Java card security

open access: yes网络与信息安全学报, 2017
To protect privacy and the safety of property,the security research of Java card was proposed.On the basis of systematically discussing the basic composition of Java card,the key of attacking methods were summarized,including logical attack,fault ...
Xue-lian ZHANG,Zhen WU,Zhi-bo DU,Min WANG,Chun-ling XIANG
doaj   +3 more sources

Factors associated with the time to next attack in neuromyelitis optica: accelerated failure time models with random effects. [PDF]

open access: yesPLoS ONE, 2013
BACKGROUND AND OBJECTIVE: Neuromyelitis optica (NMO) is an inflammatory demyelinating disorder of the central nervous system with a relapsing and remitting course. We aimed to identify factors associated with the time to next attack, including the effect
Sung-Min Kim   +7 more
doaj   +1 more source

Strength and Durability Properties of Concrete Containing Pumice and Scoria as Supplementary Cementitious Material

open access: yesAdvances in Materials Science and Engineering, 2021
Concrete structures suffer serious deterioration under a corrosive environment. Consequently, the service life of these concrete structures is decreased and deteriorates under combined attack of sulphate and chlorides.
Safiel Tumaini Chambua   +2 more
doaj   +1 more source

A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
We study the success probabilities of two variants of Correlation Power Analysis (CPA) to retrieve multiple secret bits. The target is a permutation-based symmetric cryptographic construction with a quadratic map as an S-box. More precisely, we focus on
Anna Guinet   +3 more
doaj   +1 more source

Dynamic Traitor Tracing Schemes, Revisited [PDF]

open access: yes, 2013
We revisit recent results from the area of collusion-resistant traitor tracing, and show how they can be combined and improved to obtain more efficient dynamic traitor tracing schemes.
Laarhoven, Thijs
core   +3 more sources

Home - About - Disclaimer - Privacy