Results 301 to 310 of about 5,572,769 (345)
Some of the next articles are maybe not open access.

Optimal correlation attack on the multiplexer generator

Information Processing Letters, 2009
The security of the well-known multiplexer generator with respect to correlation attacks on the data shift register is investigated. Apart from the basic correlation attack exploiting the bitwise correlation between the output sequence and any data input sequence, two new correlation attacks are introduced.
Golic, Jovan Dj, Morgari, Guglielmo
openaire   +3 more sources

Correlation attacks on stream ciphers

Proceedings of IEEE. AFRICON '96, 2002
The fast correlation attack described by Meier and Staffelbach (1989) on certain classes of stream ciphers, based on linear feedback shift registers, requires that the number of taps of the characteristic polynomial must be small-typically less than 10.
openaire   +2 more sources

Spatial correlation detection of DDoS attack

2009 International Conference on Communications, Circuits and Systems, 2009
DDoS attack flows distributed in many links exhibit directional nature, they are usually generated by certain tools and originate from different nodes, but have inherent dependencies in spatial when transit in network. This will cause correlation between the traffic where they traverse deviate from norm.
Zonglin Li, Guangming Hu, Xingmiao Yao
openaire   +2 more sources

Anger Attacks

The Journal of Clinical Psychiatry, 1999
Anger attacks over provocations described as trivial by the individual are an underrecognized symptom associated with aggressive acts. They are usually followed by guilt and regret. Anger attacks among mothers are an important problem because they are often directed at the woman's spouse and/or children.
Michael E. Thase   +5 more
openaire   +2 more sources

Fast correlation attacks on the multiplexer generator

Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252), 2002
The fast correlation attack based on iterative probabilistic decoding is applied to multiplexer generators. The attack is successful if the number of parity-checks used is large given the coefficient of correlation between the keystream sequence and phase-shifts of an underlying shift register sequence.
Mahmoud Salmasizadeh   +3 more
openaire   +2 more sources

Decimation-Based Fast Correlation Attack

2007 IEEE International Symposium on Information Theory, 2007
In this paper, the gains achievable by proper decimation (or puncturing) of the received sample for fast correlation attack are investigated. In particular, the instances in which such an approach is interesting are clearly identified.
Hideki Imai   +2 more
openaire   +2 more sources

A unified analysis for the fast correlation attack

Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., 2005
In this paper, a general framework which enables to compare previously proposed approaches for the fast correlation attacks is developed. All attacks are based on decoding using a set of parity check sums of an underlying linear code. The purpose of this paper is two-fold: (a) to provide a simple close form estimate about the number of check sums of a ...
M.P.C. Fossorier   +2 more
openaire   +2 more sources

Security Analysis of Quantum Noise Stream Cipher under Fast Correlation Attack

Optical Fiber Communications Conference and Exhibition, 2021
Mingrui Zhang   +5 more
semanticscholar   +1 more source

Community correlates of outcomes in subjects with panic attacks

Depression and Anxiety, 2001
The purpose of this study was to document the association between community factors and mental health outcomes in subjects with panic attacks. Randomly selected adults from 18 census tracts were screened for the presence of panic attacks. A structured interview was used to assess health care utilization, psychiatric morbidity, quality of life, and ...
openaire   +3 more sources

A fast correlation attack on multiplexer generators

Information Processing Letters, 1999
Abstract The security of multiplexer generators is investigated with respect to a fast correlation attack based on iterative probabilistic decoding. The number of inputs to the multiplexer determines the coefficient of correlation between the keystream sequence and phase-shifts of one of the underlying shift register sequences.
Jovan Dj. Golic   +3 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy