Results 311 to 320 of about 5,572,769 (345)
Some of the next articles are maybe not open access.

A Correlation Attack on Full SNOW-V and SNOW-Vi

IACR Cryptology ePrint Archive, 2021
Zhen Shi   +4 more
semanticscholar   +1 more source

Correlation power analysis attack against STT-MRAM based cyptosystems

IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Emerging technologies such as Spin-transfer torque magnetic random-access memory (STT-MRAM) are considered potential candidates for implementing low-power, high density storage systems.
Abhishek Chakraborty   +2 more
semanticscholar   +1 more source

New correlation attacks on stream ciphers

IEEE AFRICON. 6th Africon Conference in Africa,, 2003
We introduce two new correlation attacks on stream ciphers that make use of non-linearly combined linear feedback shift-registers (LFSRs). The first attack utilises the well-known Lempel-Ziv complexity measure for binary sequences. The second attack is based on the binary derivative, applied in conjunction with the distribution of runs in a binary ...
C. Bruwer, W.T. Penzhorn
openaire   +2 more sources

Fast correlation attacks on Bluetooth combiner

Journal of Electronics (China), 2006
A simple fast correlation attack is used to analysis the security of Bluetooth combiner in this paper. This attack solves the tradeoff between the length of the keystream and the computing complexity needed to recover the secret key. We give the computing complexities of the attack algorithm according to different lengths of the known keystream.
Ma Weiju, Feng Dengguo
openaire   +2 more sources

Fast correlation attacks on certain stream ciphers

Journal of Cryptology, 1989
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Willi Meier, Othmar Staffelbach
openaire   +3 more sources

Neuroanatomical Correlates of a Lactate-Induced Anxiety Attack

Archives of General Psychiatry, 1989
Positron emission tomographic measurements of regional blood flow were used to assess local neuronal activity in patients with panic disorder and in normal control subjects before and during the infusion of sodium lactate. A new technique for the analysis of positron emission tomographic data was employed to identify significant changes in regional ...
Joseph L. Price   +7 more
openaire   +3 more sources

Electroencephalographic correlates of cataplectic attacks in narcoleptic canines

Electroencephalography and Clinical Neurophysiology, 1985
Cataplectic attacks were monitored behaviorally and polygraphically in 4 narcoleptic dogs, of which three inherited the disorder. The recorded EEG signals were evaluated by power spectral analysis. We found 3 distinct stages of cataplexy: an initial stage which resembled wakefulness with tonic suppression of EMG activity, a later stage which was highly
Theodore L. Baker   +2 more
openaire   +3 more sources

Some observations on the electrographic correlates of the decerebrate attack

Electroencephalography and Clinical Neurophysiology, 1964
Abstract A 10 year old girl developed light coma following a prolonged seizure with anoxia. She had frequent brief decerebrate attacks during the next 3 days. During the attacks there was complete flattening of the electroencephalogram. She eventually made a complete clinical recovery.
Frederick Andermann, Gastone G. Celesia
openaire   +3 more sources

Discrete optimisation and fast correlation attacks

1996
Modifications to fast correlation attacks on stream ciphers are investigated. Improvements are achieved with both deterministic and random choices for updates of the corresponding posterior probabilities and with fast and partial resetting methods. The use of simulated annealing and appropriate optimisation heuristics is also proposed and successful ...
Mahmoud Salmasizadeh   +4 more
openaire   +2 more sources

Implementing Consistency Checking in Correlating Attacks

2004
Static analysis of attack sequences (a.k.a topological vulnerability analysis -TVA) studies sequences of attacks that can eventually lead to exploitable vulnerabilities in a network In models where the attacks are specified in terms of their preconditions and post conditions, the sequences that can be launched are those in which the post condition of ...
Sushil Jajodia   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy