Results 191 to 200 of about 811,171 (213)
Some of the next articles are maybe not open access.
Correlation attacks on combination generators
Cryptography and Communications, 2012zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Canteaut, Anne, Naya-Plasencia, María
openaire +3 more sources
2011
The literature about side-channel attacks is very rich. Many side-channel distinguishers have been devised and studied; in the meantime, many different side-channels have been identified. Also, it has been underlined that the various samples garnered during the same acquisition can carry complementary information.
M. Abdelaziz Elaabid +3 more
openaire +1 more source
The literature about side-channel attacks is very rich. Many side-channel distinguishers have been devised and studied; in the meantime, many different side-channels have been identified. Also, it has been underlined that the various samples garnered during the same acquisition can carry complementary information.
M. Abdelaziz Elaabid +3 more
openaire +1 more source
Resilience to combined attacks
Cyber Security: A Peer-Reviewed Journal, 2019Threats to critical infrastructure are rapidly changing. It is important to anticipate how adversaries can combine various types of attacks for more devastating effects. Executives and those in leadership need a plan to prevent or mitigate these combined attacks.
openaire +1 more source
Combined Implementation Attack Resistant Exponentiation
2010Different types of implementation attacks, like those based on side channel leakage and active fault injection, are often considered as separate threats. Countermeasures are, therefore, often developed and implemented accordingly. However, Amiel et al. showed that an adversary can successfully combine two attack methods to overcome such countermeasures.
Schmidt, Jörn-Marc +5 more
openaire +1 more source
Differential attack on nonlinear combined sequences
Frontiers of Electrical and Electronic Engineering in China, 2007By using the coding properties and statistic properties of the plaintext, the differential properties of the key stream sequences generated by a nonlinear combined generator were analyzed. Then a differential attack algorithm on the nonlinear combined sequences was proposed.
Chao Li, Wenling Wang, Pengsong Hu
openaire +1 more source
Fast correlation attacks on Bluetooth combiner
Journal of Electronics (China), 2006A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream.
Weiju Ma, Dengguo Feng
openaire +1 more source
Combined side-channel attacks on COMP128
2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT), 2014Authentication in GSM networks uses COMP128, which is vulnerable to side-channel attack called partitioning attack. On the device constrained in resources, such as SIM-card, table lookups are quite unreliable, so the attack can be carried out using up to 1000 queries.
Alla Levina +2 more
openaire +1 more source
Robustness of partially interdependent networks under combined attack
Chaos: An Interdisciplinary Journal of Nonlinear Science, 2019We thoroughly study the robustness of partially interdependent networks when suffering attack combinations of random, targeted, and localized attacks. We compare analytically and numerically the robustness of partially interdependent networks with a broad range of parameters including coupling strength, attack strength, and network type. We observe the
Yangyang, Liu +3 more
openaire +2 more sources
Selfholding: A combined attack model using selfish mining with block withholding attack
Computers & Security, 2019Abstract Bitcoin is one of the most influential digital cryptocurrencies in the world, of which the security is under serious threat. One of the most serious security problems is facing several attacking strategies on the bitcoin protocol, represented by selfish mining and block withholding attacks. In this paper, we propose SelfHolding as a combined
Xuewen Dong +5 more
openaire +1 more source
Determining the Probability of Smart Grid Attacks by Combining Attack Tree and Attack Graph Analysis
2014Smart grid is an intelligent energy distribution system consisting of multiple information and communication technologies (ICT). One of the challenges for such complex and heterogeneous system as smart grid is to unite security analysis on a high level of abstraction and concrete behavioral attack patterns that exploit low-level vulnerabilities.
Kristian Beckers +5 more
openaire +3 more sources

