Results 1 to 10 of about 5,572,769 (345)
Fast Correlation Attacks on the Summation Generator [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jovan Dj. Golić +2 more
openalex +4 more sources
Method for Extracting Patterns of Coordinated Network Attacks on Electric Power CPS Based on Temporal–Topological Correlation [PDF]
In the analysis of coordinated network attacks on electric power cyber-physical system (CPS), it is difficult to restore the complete attack path, and the intent of the attack cannot be identified automatically.
Lei Wang +6 more
doaj +2 more sources
Security analysis of a QAM modulated quantum noise stream cipher under a correlation attack
Quantum noise stream cipher where encrypted signals are masked by quantum noise and ASE noise provides a physical layer of security. It requires the transmitter and the receiver to share a stream cipher that is generated from a PRNG.
Mingrui Zhang +5 more
openalex +2 more sources
An Improved Correlation Attack on A5/1 [PDF]
A new approach to attack A5/1 is proposed. The proposed attack is a refinement of a previous attack by Ekdahl and Johansson. We make two important observations that lead to a new attack with improved performance.
Alexander Maximov +2 more
openalex +3 more sources
Plaintext attack on joint transform correlation encryption system by convolutional neural network
The image encryption system based on joint transform correlation has attracted much attention because its ciphertext does not contain complex value and can avoid strict pixel alignment of ciphertext when decryption occurs.
Linfei Chen +3 more
openalex +2 more sources
Fast Correlation Attacks: Methods and Countermeasures [PDF]
Fast correlation attacks have considerably evolved since their first appearance. They have lead to new design criteria of stream ciphers, and have found applications in other areas of communications and cryptography. In this paper, a review of the development of fast correlation attacks and their implications on the design of stream ciphers over the
Willi Meier
openalex +4 more sources
Algebra for Capability Based Attack Correlation [PDF]
Most of the existing intrusion detection systems (IDS) oftengenerate large numbers of alerts which contain numerous false positivesand non relevant positives. Alert correlation techniques aim to aggregateand combine the outputs of single/multiple IDS to provide a conciseand broad view of the security state of network.
Navneet Kumar Pandey +2 more
openalex +3 more sources
Edit distance correlation attack on the alternating step generator
Jovan Dj. Golić, Renato Menicocci
openalex +2 more sources
Multi-pass Fast Correlation Attack on Stream Ciphers [PDF]
Bin Zhang, Dengguo Feng
openalex +2 more sources
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack
Miodrag J. Mihaljević +2 more
openalex +2 more sources

