Results 301 to 310 of about 5,572,769 (345)
Some of the next articles are maybe not open access.
Optimal correlation attack on the multiplexer generator
Information Processing Letters, 2009The security of the well-known multiplexer generator with respect to correlation attacks on the data shift register is investigated. Apart from the basic correlation attack exploiting the bitwise correlation between the output sequence and any data input sequence, two new correlation attacks are introduced.
Golic, Jovan Dj, Morgari, Guglielmo
openaire +3 more sources
Correlation attacks on stream ciphers
Proceedings of IEEE. AFRICON '96, 2002The fast correlation attack described by Meier and Staffelbach (1989) on certain classes of stream ciphers, based on linear feedback shift registers, requires that the number of taps of the characteristic polynomial must be small-typically less than 10.
openaire +2 more sources
Spatial correlation detection of DDoS attack
2009 International Conference on Communications, Circuits and Systems, 2009DDoS attack flows distributed in many links exhibit directional nature, they are usually generated by certain tools and originate from different nodes, but have inherent dependencies in spatial when transit in network. This will cause correlation between the traffic where they traverse deviate from norm.
Zonglin Li, Guangming Hu, Xingmiao Yao
openaire +2 more sources
The Journal of Clinical Psychiatry, 1999
Anger attacks over provocations described as trivial by the individual are an underrecognized symptom associated with aggressive acts. They are usually followed by guilt and regret. Anger attacks among mothers are an important problem because they are often directed at the woman's spouse and/or children.
Michael E. Thase +5 more
openaire +2 more sources
Anger attacks over provocations described as trivial by the individual are an underrecognized symptom associated with aggressive acts. They are usually followed by guilt and regret. Anger attacks among mothers are an important problem because they are often directed at the woman's spouse and/or children.
Michael E. Thase +5 more
openaire +2 more sources
Fast correlation attacks on the multiplexer generator
Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252), 2002The fast correlation attack based on iterative probabilistic decoding is applied to multiplexer generators. The attack is successful if the number of parity-checks used is large given the coefficient of correlation between the keystream sequence and phase-shifts of an underlying shift register sequence.
Mahmoud Salmasizadeh +3 more
openaire +2 more sources
Decimation-Based Fast Correlation Attack
2007 IEEE International Symposium on Information Theory, 2007In this paper, the gains achievable by proper decimation (or puncturing) of the received sample for fast correlation attack are investigated. In particular, the instances in which such an approach is interesting are clearly identified.
Hideki Imai +2 more
openaire +2 more sources
A unified analysis for the fast correlation attack
Proceedings. International Symposium on Information Theory, 2005. ISIT 2005., 2005In this paper, a general framework which enables to compare previously proposed approaches for the fast correlation attacks is developed. All attacks are based on decoding using a set of parity check sums of an underlying linear code. The purpose of this paper is two-fold: (a) to provide a simple close form estimate about the number of check sums of a ...
M.P.C. Fossorier +2 more
openaire +2 more sources
Security Analysis of Quantum Noise Stream Cipher under Fast Correlation Attack
Optical Fiber Communications Conference and Exhibition, 2021Mingrui Zhang +5 more
semanticscholar +1 more source
Community correlates of outcomes in subjects with panic attacks
Depression and Anxiety, 2001The purpose of this study was to document the association between community factors and mental health outcomes in subjects with panic attacks. Randomly selected adults from 18 census tracts were screened for the presence of panic attacks. A structured interview was used to assess health care utilization, psychiatric morbidity, quality of life, and ...
openaire +3 more sources
A fast correlation attack on multiplexer generators
Information Processing Letters, 1999Abstract The security of multiplexer generators is investigated with respect to a fast correlation attack based on iterative probabilistic decoding. The number of inputs to the multiplexer determines the coefficient of correlation between the keystream sequence and phase-shifts of one of the underlying shift register sequences.
Jovan Dj. Golic +3 more
openaire +2 more sources

