Results 11 to 20 of about 53,319 (274)
Background Stroke or transient ischaemic attack patients are at increased risk of secondary vascular events. Antiplatelet medications, most commonly clopidogrel, are prescribed to reduce this risk.
Joe Carroll +12 more
doaj +2 more sources
Fourteen years of cube attacks
Abstract Algebraic Cryptanalysis is a widely used technique that tackles the problem of breaking ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial system. Each output bit/word can be expressed as a polynomial equation in the cipher’s inputs—namely the key and the plaintext or the initialisation vector ...
Marco Cianfriglia +3 more
openaire +1 more source
Cube Test and Analysis of SPECK Block Cipher Algorithm [PDF]
SPECK is a family of lightweight block cipher algorithms.SPECK cipher receives much attention due to its excellent performance on platform applicability and software implementation.Aiming at the security risk of the SPECK algorithm in resisting cube ...
WAN Liuchan,WEI Yongzhuang
doaj +1 more source
Agonistic behavior of captive saltwater crocodile, crocodylus porosus in Kota Tinggi, Johor [PDF]
Agonistic behavior in Crocodylus porosus is well known in the wild, but the available data regarding this behavior among the captive individuals especially in a farm setting is rather limited. Studying the aggressive behavior of C.
Abdul-Latiff, Muhammad Abu Bakar +6 more
core +1 more source
Dynamic cube attack on Grain‐v1 [PDF]
This study presents a dynamic cube attack on the algorithm Grain‐v1 which has resisted all the key‐recovery attacks in the single key model. The dynamic cube attack finds the secret key by using distinguishers obtained from structural weaknesses of a cipher.
Majid Rahimi +3 more
openaire +1 more source
Cube Attack on Reduced-Round Quavium [PDF]
Trivium is a notable light-weight synchronous stream cipher submitted to the European eSTREAM project in April 2005. Quavium is a Trivium-like algorithm which is almost as fast as Trivium. In this paper, the security of Quavium is concerned under cube attack, which is one of the best known attack on the reduced round Trivium proposed by Dinur and ...
Jianhua Li +2 more
openaire +1 more source
Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium [PDF]
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to cryptographic functions having a low-degree algebraic normal form over GF(2).
A. Maximov +16 more
core +2 more sources
Diving Deep into the Weak Keys of Round Reduced Ascon
At ToSC 2021, Rohit et al. presented the first distinguishing and key recovery attacks on 7 rounds Ascon without violating the designer’s security claims of nonce-respecting setting and data limit of 264 blocks per key. So far, these are the best attacks
Raghvendra Rohit, Santanu Sarkar
doaj +1 more source
Higher order differentiation over finite fields with applications to generalising the cube attack [PDF]
Higher order differentiation was introduced in a cryptographic context by Lai. Several attacks can be viewed in the context of higher order differentiations, amongst them the cube attack of Dinur and Shamir and the AIDA attack of Vielhaber.
Ana Sălăgean +3 more
core +1 more source
A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal +2 more
core +2 more sources

