Results 11 to 20 of about 53,319 (274)

Clinical and cost-effectiveness of clopidogrel resistance genotype testing after ischaemic stroke or transient ischaemic attack: a systematic review and economic model

open access: yesHealth Technology Assessment
Background Stroke or transient ischaemic attack patients are at increased risk of secondary vascular events. Antiplatelet medications, most commonly clopidogrel, are prescribed to reduce this risk.
Joe Carroll   +12 more
doaj   +2 more sources

Fourteen years of cube attacks

open access: yesApplicable Algebra in Engineering, Communication and Computing, 2023
Abstract Algebraic Cryptanalysis is a widely used technique that tackles the problem of breaking ciphers mainly relying on the ability to express a cryptosystem as a solvable polynomial system. Each output bit/word can be expressed as a polynomial equation in the cipher’s inputs—namely the key and the plaintext or the initialisation vector ...
Marco Cianfriglia   +3 more
openaire   +1 more source

Cube Test and Analysis of SPECK Block Cipher Algorithm [PDF]

open access: yesJisuanji gongcheng, 2016
SPECK is a family of lightweight block cipher algorithms.SPECK cipher receives much attention due to its excellent performance on platform applicability and software implementation.Aiming at the security risk of the SPECK algorithm in resisting cube ...
WAN Liuchan,WEI Yongzhuang
doaj   +1 more source

Agonistic behavior of captive saltwater crocodile, crocodylus porosus in Kota Tinggi, Johor [PDF]

open access: yes, 2021
Agonistic behavior in Crocodylus porosus is well known in the wild, but the available data regarding this behavior among the captive individuals especially in a farm setting is rather limited. Studying the aggressive behavior of C.
Abdul-Latiff, Muhammad Abu Bakar   +6 more
core   +1 more source

Dynamic cube attack on Grain‐v1 [PDF]

open access: yesIET Information Security, 2016
This study presents a dynamic cube attack on the algorithm Grain‐v1 which has resisted all the key‐recovery attacks in the single key model. The dynamic cube attack finds the secret key by using distinguishers obtained from structural weaknesses of a cipher.
Majid Rahimi   +3 more
openaire   +1 more source

Cube Attack on Reduced-Round Quavium [PDF]

open access: yesProceedings of the 3rd International Conference on Mechatronics and Industrial Informatics, 2015
Trivium is a notable light-weight synchronous stream cipher submitted to the European eSTREAM project in April 2005. Quavium is a Trivium-like algorithm which is almost as fast as Trivium. In this paper, the security of Quavium is concerned under cube attack, which is one of the best known attack on the reduced round Trivium proposed by Dinur and ...
Jianhua Li   +2 more
openaire   +1 more source

Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium [PDF]

open access: yes, 2009
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to cryptographic functions having a low-degree algebraic normal form over GF(2).
A. Maximov   +16 more
core   +2 more sources

Diving Deep into the Weak Keys of Round Reduced Ascon

open access: yesIACR Transactions on Symmetric Cryptology, 2021
At ToSC 2021, Rohit et al. presented the first distinguishing and key recovery attacks on 7 rounds Ascon without violating the designer’s security claims of nonce-respecting setting and data limit of 264 blocks per key. So far, these are the best attacks
Raghvendra Rohit, Santanu Sarkar
doaj   +1 more source

Higher order differentiation over finite fields with applications to generalising the cube attack [PDF]

open access: yes, 2016
Higher order differentiation was introduced in a cryptographic context by Lai. Several attacks can be viewed in the context of higher order differentiations, amongst them the cube attack of Dinur and Shamir and the AIDA attack of Vielhaber.
Ana Sălăgean   +3 more
core   +1 more source

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64 [PDF]

open access: yes, 2018
Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications. Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube ...
Abdul-Latip, Shekh Faisal   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy