Results 321 to 330 of about 5,572,769 (345)
Some of the next articles are maybe not open access.

Correlation attacks on up/down cascades

1998
Conditional and unconditional correlation weaknesses of cascades of up/down clocked shift registers are determined. The corresponding systematic correlation attacks are proposed and the conditions for their success are obtained.
Renato Menicocci, Jovan Dj. Golic
openaire   +2 more sources

Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1

IACR Cryptology ePrint Archive, 2018
Yosuke Todo   +4 more
semanticscholar   +1 more source

Probability Indistinguishable: A Query and Location Correlation Attack Resistance Scheme

Wireless personal communications, 2017
Lei Zhang   +3 more
semanticscholar   +1 more source

Secure fingerprint fuzzy vault using hadamard transformation to defy correlation attack

International Symposium on Embedded Computing and System Design, 2016
Manvjeet Kaur, S. Sofat
semanticscholar   +1 more source

Horizontal collision correlation attack on elliptic curves

Cryptography and Communications, 2014
Aurélie Bauer   +4 more
semanticscholar   +1 more source

Collision-Correlation Attack against Some 1st-Order Boolean Masking Schemes in the Context of Secure Devices

International Workshop on Constructive Side-Channel Analysis and Secure Design, 2013
Thomas Roche, Victor Lomné
semanticscholar   +1 more source

New cross correlation attack methods on the Montgomery Ladder implementation of RSA

IEEE International Advance Computing Conference, 2013
E. Kuzu   +4 more
semanticscholar   +1 more source

Shilling attack based on item popularity and rated item correlation against collaborative filtering

International Journal of Machine Learning and Cybernetics, 2018
Keke Chen   +3 more
semanticscholar   +1 more source

A New Correlation Attack on Nonlinear Combining Generators

IEEE Transactions on Information Theory, 2011
Yongzhuang Wei, E. Pasalic, Yu-pu Hu
semanticscholar   +1 more source

Special ciphertext-only attack to double random phase encryption by plaintext shifting with speckle correlation.

Journal of The Optical Society of America A-optics Image Science and Vision, 2018
Shuming Jiao   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy