Results 201 to 210 of about 811,171 (213)
Some of the next articles are maybe not open access.

Combined Cache Timing Attacks and Template Attacks on Stream Cipher MUGI

2015
The stream cipher MUGI was proposed by Hitachi, Ltd. in 2002 and it was specified as ISO/IEC 18033-4 for keystream generation. Assuming that noise-free cache timing measurements are possible, we give the cryptanalysis of MUGI under the cache attack model.
Shaoyu Du   +3 more
openaire   +1 more source

Combined measures against SQL-Injection attacks

Journal of Computer Science and Its Application, 2017
In today’s world, we see continuous increase in security threats of web-based napplication as our dependence on these applications increase through our integration of them into our everyday activities. Virtually everything is done on the web. SQL injection is one of the most serious attacks against web applications.
Mac’Odo, R., Onyejegbu, L.N.
openaire   +1 more source

Attack transient for combinations of flue pipes

The Journal of the Acoustical Society of America, 2004
The tonal attack due to two or more flue pipes sounded simultaneously is compared to that for a single pipe. Attack duration is measured by the times required to progress from 1% to 50% and 90% of final amplitude. Duration can be reduced by the presence of the pipe(s) of higher pitch, because the number of periods in the sound buildup for pipes of a ...
openaire   +1 more source

Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis

Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), 2007
Frederic Amiel   +3 more
openaire   +1 more source

Sequential and Combinational Satisfiability Attacks

2022
Avesta Sasan   +2 more
openaire   +1 more source

A combined attack upon a common problem

Proceedings of the Nutrition Society, 1959
A M, HORSNELL, E, SCOTT
openaire   +2 more sources

Passive and Active Combined Attacks on AES Combining Fault Attacks and Side Channel Analysis

2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010
Clavier, Christophe   +3 more
openaire   +1 more source

Combination in the Attack

Royal United Services Institution. Journal, 1910
openaire   +1 more source

Information-Combining Differential Fault Attacks on DEFAULT

2022
Marcel Nageler   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy