Results 1 to 10 of about 587,598 (211)

Correlation Power Analysis Attack for AES Based on Wavelet Packet [PDF]

open access: greenJisuanji gongcheng, 2017
In Correlation Power Analysis(CPA) attack,the existence of power curves noise affects the success rate of attack results.For this reason,this paper proposes a new method of power curve preprocessing using wavelet packet threshold.The wavelet packet ...
DUAN Xiaoyi,SHE Gaojian,GAO Xianwei,HE Siman,CUI Qi,WANG Sixiang,MAO Zeyu
doaj   +2 more sources

GPU-Accelerated Deep Learning-Based Correlation Attack on Tor Networks

open access: yesIEEE Access, 2023
The Tor network, renowned for its provision of online privacy and anonymity, faces the constant threat of correlation attacks that aim to compromise user identities.
Muhammad Asfand Hafeez   +3 more
doaj   +1 more source

A Tale of Snakes and Horses: Amplifying Correlation Power Analysis on Quadratic Maps

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
We study the success probabilities of two variants of Correlation Power Analysis (CPA) to retrieve multiple secret bits. The target is a permutation-based symmetric cryptographic construction with a quadratic map as an S-box. More precisely, we focus on
Anna Guinet   +3 more
doaj   +1 more source

An estimation of physicochemical properties of heart attack treatment medicines by using molecular descriptor's

open access: yesSouth African Journal of Chemical Engineering, 2023
A topological index is a numerical quantity associate with a graph describes its topology by applying molecular structure of a chemical compound, we obtain its properties theoretically.
Muhammad Waheed Rasheed   +2 more
doaj   +1 more source

Method for Extracting Patterns of Coordinated Network Attacks on Electric Power CPS Based on Temporal–Topological Correlation

open access: yesIEEE Access, 2020
In the analysis of coordinated network attacks on electric power cyber-physical system (CPS), it is difficult to restore the complete attack path, and the intent of the attack cannot be identified automatically.
Lei Wang   +6 more
doaj   +1 more source

An Intrusion Action-Based IDS Alert Correlation Analysis and Prediction Framework

open access: yesIEEE Access, 2019
Since the rapid development of the internet, the emergence of network intrusion has become the focus of studies for scholars and security enterprises.
Kai Zhang   +4 more
doaj   +1 more source

On the Security of Y-00 under Fast Correlation and Other Attacks on the Key [PDF]

open access: yes, 2006
The potential weakness of the Y-00 direct encryption protocol when the encryption box ENC in Y-00 is not chosen properly is demonstrated in a fast correlation attack by S. Donnet et al in Phys. Lett. A 35, 6 (2006) 406-410.
Barbosa   +14 more
core   +3 more sources

Comparative study of power analysis attacks based on template and KNN algorithm

open access: yesDianxin kexue, 2022
Power analysis attack is still the most threatening type of side channel attack on cryptographic hardware.The template analysis attack with the attack of KNN algorithm was compared.Firstly, three dimensionality reduction methods of Pearson correlation ...
Jifang JIN   +4 more
doaj   +2 more sources

Malicious Attack Correlation Analysis Method of Source-Grid-Load System under Specific Attack Scenarios

open access: yesZhongguo dianli, 2019
The key for the power grid to deal with cyber security threats is to make full use of cyber and electrical information to improve the self-adaptation ability and automation for identification of malicious attack event.
Rui ZHANG   +5 more
doaj   +1 more source

A Multi-Step Attack Detection Model Based on Alerts of Smart Grid Monitoring System

open access: yesIEEE Access, 2020
Smart Grid Monitoring System(SGMS) is an important means to protect the security of smart grid. The high volumes of alerts generated by SGMS often confuse managers.
Hua Zhang   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy