Results 281 to 290 of about 5,572,769 (345)
Some of the next articles are maybe not open access.

A Fast Correlation Attack on the Shrinking Generator

The Cryptographer's Track at RSA Conference, 2005
In this paper we demonstrate a fast correlation attack on the shrinking generator with known connections. Our attack is applicable to arbitrary weight feedback polynomial of the generating LFSR and comparisons with other known attacks show that our attack offers good trade-offs between required keystream length, success probability and complexity.
Bin Zhang   +3 more
openaire   +3 more sources

A probabilistic correlation attack on the shrinking generator

Australasian Conference on Information Security and Privacy, 1998
A probabilistic correlation attack on irregularly clocked shift registers is applied in a divide and conquer attack on the shrinking generator. Systematic computer simulations show that the joint probability is a suitable basis for the correlation attack and that, given a keystream segment of length linear in the length of the clock-controlled shift ...
Simpson, L., Dj. Golić, J., Dawson, E.
openaire   +4 more sources

A Distributed Flow Correlation Attack to Anonymizing Overlay Networks Based on Wavelet Multi-Resolution Analysis

IEEE Transactions on Dependable and Secure Computing, 2021
Government agencies rely more and more heavily on the availability of flexible and intelligent solutions for the interception and analysis of Internet-based telecommunications.
F. Palmieri
semanticscholar   +1 more source

Correlation attacks on combination generators [PDF]

open access: possibleCryptography and Communications, 2012
The combination generator is a popular stream cipher construction. It consists of several independent devices working in parallel whose outputs are combined by a Boolean function. The output of this function is the keystream. The security of this generator has been extensively studied in the case where the devices are LFSRs. Some particular cases where
Canteaut, Anne, Naya-Plasencia, María
openaire   +2 more sources

Spatio-Temporal Correlation-Based False Data Injection Attack Detection Using Deep Convolutional Neural Network

IEEE Transactions on Smart Grid, 2022
There are lots of cyber-attack, especially false data injection attacks, in modern power systems. This attack can circumvent traditional residual-based detection methods, and destroy the integrity of control information, thus hindering the stability of ...
Guangdou Zhang   +5 more
semanticscholar   +1 more source

Discovering Attack Scenarios via Intrusion Alert Correlation Using Graph Convolutional Networks

IEEE Communications Letters, 2021
The alert correlation process that aggregates computer network security alerts to the same attack scenario provides a coherent view of network status at a higher abstraction level.
Qiumei Cheng, Chunming Wu, Shiying Zhou
semanticscholar   +1 more source

A survey on fast correlation attacks [PDF]

open access: possibleCryptography and Communications, 2012
Fast correlation attacks, pioneered by Meier and Staffelbach in 1988, constitute an important class of attacks on stream ciphers. They exploit a correlation between the keystream and the output of a linear feedback shift register (LFSR) within the cipher.
Carl Löndahl   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy