Effect of particle size reduction on the physicochemical and mechanical properties of conventional glass ionomer cement. [PDF]
Tuygunov N +6 more
europepmc +1 more source
An image compression-encryption algorithm based on BP neural network optimized with fireworks algorithm. [PDF]
Liang Y, Peng B, Liu R, Kang N, Zhou H.
europepmc +1 more source
Associations between intraplaque hemorrhage and other high-risk plaque features in atherosclerotic plaques. [PDF]
Nguyen MT +8 more
europepmc +1 more source
Prussian Blue Analogues for Non-Aqueous Sodium-Ion and Potassium-Ion Batteries: The Landscape From Lab-Scale Optimizations Toward Practical Applications. [PDF]
Mei Y, Nason CAF, Xu Y.
europepmc +1 more source
Related searches:
A New General Method of Searching for Cubes in Cube Attacks
2020Cube attack, proposed by Dinur and Shamir at EUROCRYPT 2009, is one of general and powerful cryptanalytic techniques against symmetric-key cryptosystems. However, it is quite time consuming to search for large cubes using the existing techniques, e.g., random walk, and practically infeasible to execute the cube attack when the size of cube exceeds an ...
Lin Ding +4 more
openaire +1 more source
Cube attack on reduced-round Enhanced-Bivium
2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC), 2016Trivium is a notable light-weight synchronous stream cipher submitted to the European eSTREAM project in April 2005. Enhanced-Bivium is a reduced version of Trivium which is suitable for RFID system. In this paper, the security of Enhanced-Bivium is concerned under cube attack, which is one of the best known attack on the reduced round Trivium proposed
Shiyong Zhang +2 more
openaire +1 more source
Iterative Side-Channel Cube Attack on KeeLoq
2016 Sixth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC), 2016KeeLoq is a 528-round lightweight block cipher which has a 64-bit secret key and a 32-bit block length. The cube attack, proposed by Dinur and Shamir, is a new type of attacking method. In this paper, we investigate the security of KeeLoq against iterative side-channel cube attack which is an enhanced attack scheme.
Yunfei Ma, Tao Wang, Hao Chen, Dong Lei
openaire +1 more source
Side Channel Cube Attack on PRESENT
2009As an ultra-lightweight block cipher, PRESENT is presented by A. Bogdanov et al. in CHES 2007. In this paper, we detect the non-random properties in the first four rounds of PRESENT based on cube attack proposed by Shamir et al. By analyzing the features of the S-box and pLayer, we give the side channel cube attack on PRESENT.
Lin Yang, Meiqin Wang, Siyuan Qiao
openaire +1 more source
Utilizing Probabilistic Linear Equations in Cube Attacks
Journal of Computer Science and Technology, 2016Cube attacks, proposed by Dinur and Shamir at EUROCRYPT 2009, have shown huge power against stream ciphers. In the original cube attacks, a linear system of secret key bits is exploited for key recovery attacks. However, we find a number of equations claimed linear in previous literature actually nonlinear and not fit into the theoretical framework of ...
Yuan Yao, Bin Zhang, Wen-Ling Wu
openaire +1 more source
The development of Boolean algebra based algorithms lied the foundation for a wide variety of cryptanalysis techniques based on the reformulation of a cryptosystem as a polynomial function over F2. Widely used approaches to solve multivariate system of equations include Gröbner bases (see [11]) and linearisation techniques like XL [4] and XSL [5 ...
Onofri, Elia, Pedicini, Marco
openaire +1 more source

