Results 231 to 240 of about 53,319 (274)

Effect of particle size reduction on the physicochemical and mechanical properties of conventional glass ionomer cement. [PDF]

open access: yesFront Dent Med
Tuygunov N   +6 more
europepmc   +1 more source

Associations between intraplaque hemorrhage and other high-risk plaque features in atherosclerotic plaques. [PDF]

open access: yesNeuroradiol J
Nguyen MT   +8 more
europepmc   +1 more source

A New General Method of Searching for Cubes in Cube Attacks

2020
Cube attack, proposed by Dinur and Shamir at EUROCRYPT 2009, is one of general and powerful cryptanalytic techniques against symmetric-key cryptosystems. However, it is quite time consuming to search for large cubes using the existing techniques, e.g., random walk, and practically infeasible to execute the cube attack when the size of cube exceeds an ...
Lin Ding   +4 more
openaire   +1 more source

Cube attack on reduced-round Enhanced-Bivium

2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), 2016
Trivium is a notable light-weight synchronous stream cipher submitted to the European eSTREAM project in April 2005. Enhanced-Bivium is a reduced version of Trivium which is suitable for RFID system. In this paper, the security of Enhanced-Bivium is concerned under cube attack, which is one of the best known attack on the reduced round Trivium proposed
Shiyong Zhang   +2 more
openaire   +1 more source

Iterative Side-Channel Cube Attack on KeeLoq

2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), 2016
KeeLoq is a 528-round lightweight block cipher which has a 64-bit secret key and a 32-bit block length. The cube attack, proposed by Dinur and Shamir, is a new type of attacking method. In this paper, we investigate the security of KeeLoq against iterative side-channel cube attack which is an enhanced attack scheme.
Yunfei Ma, Tao Wang, Hao Chen, Dong Lei
openaire   +1 more source

Side Channel Cube Attack on PRESENT

2009
As an ultra-lightweight block cipher, PRESENT is presented by A. Bogdanov et al. in CHES 2007. In this paper, we detect the non-random properties in the first four rounds of PRESENT based on cube attack proposed by Shamir et al. By analyzing the features of the S-box and pLayer, we give the side channel cube attack on PRESENT.
Lin Yang, Meiqin Wang, Siyuan Qiao
openaire   +1 more source

Utilizing Probabilistic Linear Equations in Cube Attacks

Journal of Computer Science and Technology, 2016
Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of ...
Yuan Yao, Bin Zhang, Wen-Ling Wu
openaire   +1 more source

Novel notation on cube attack

2022
The development of Boolean algebra based algorithms lied the foundation for a wide variety of cryptanalysis techniques based on the reformulation of a cryptosystem as a polynomial function over F2. Widely used approaches to solve multivariate system of equations include Gröbner bases (see [11]) and linearisation techniques like XL [4] and XSL [5 ...
Onofri, Elia, Pedicini, Marco
openaire   +1 more source

Home - About - Disclaimer - Privacy