Results 161 to 170 of about 75,602 (180)
Some of the next articles are maybe not open access.
2005
In this paper we describe two different DFA attacks on the AES. The first one uses a fault model that induces a fault on only one bit of an intermediate result, hence allowing us to obtain the key by using 50 faulty ciphertexts for an AES-128. The second attack uses a more realistic fault model: we assume that we may induce a fault on a whole byte. For
openaire +1 more source
In this paper we describe two different DFA attacks on the AES. The first one uses a fault model that induces a fault on only one bit of an intermediate result, hence allowing us to obtain the key by using 50 faulty ciphertexts for an AES-128. The second attack uses a more realistic fault model: we assume that we may induce a fault on a whole byte. For
openaire +1 more source
Exact DFA Identification Using SAT Solvers
2010We present an exact algorithm for identification of deterministic finite automata (DFA) which is based on satisfiability (SAT) solvers. Despite the size of the low level SAT representation, our approach is competitive with alternative techniques. Our contributions are fourfold: First, we propose a compact translation of DFA identification into SAT ...
Heule, M.J.H., Verwer, S.E.
openaire +1 more source
2010
We present a new incremental algorithm for minimising deterministic finite automata. It runs in quadratic time for any practical application and may be halted at any point, returning a partially minimised automaton. Hence, the algorithm may be applied to a given automaton at the same time as it is processing a string for acceptance.
Marco Almeida +2 more
openaire +1 more source
We present a new incremental algorithm for minimising deterministic finite automata. It runs in quadratic time for any practical application and may be halted at any point, returning a partially minimised automaton. Hence, the algorithm may be applied to a given automaton at the same time as it is processing a string for acceptance.
Marco Almeida +2 more
openaire +1 more source
De Constructeur, 1993
De assemblage is veelal een zwakke schakel in het voortbrengingsproces. Het is een bedrijfsactiviteit die verantwoordelijk is voor onder meer een belangrijk deel van de totale doorlooptijd. Robot assemblagesystemen bieden goede mogelijkheden om de assemblage-activiteiten te rationaliseren, mede vanwege de toenemende produkt diversiteit, de afnemende ...
openaire +1 more source
De assemblage is veelal een zwakke schakel in het voortbrengingsproces. Het is een bedrijfsactiviteit die verantwoordelijk is voor onder meer een belangrijk deel van de totale doorlooptijd. Robot assemblagesystemen bieden goede mogelijkheden om de assemblage-activiteiten te rationaliseren, mede vanwege de toenemende produkt diversiteit, de afnemende ...
openaire +1 more source
This publication presents the conceptual and methodological innovation of the DFAS-Signal Methodology, developed under the Dynamic Financial Applied Meta-Science (DFAS) doctrine by Hasan Alaali. The study introduces a new analytical paradigm — Ethical–Temporal Intelligence — that interprets global financial, political, and behavioral events as dynamic ...
openaire +1 more source
openaire +1 more source
This record documents the second verified case of algorithmic recognition under Annex X — DFAS-EIR-AI (Artificial Intelligence Integrity and Recognition Classification System), developed as an extension of the DFAS-EEP (Editorial Ethics Protocol) within the Dynamic Financial Applied Meta-Science (DFAS) doctrine.
openaire +1 more source
openaire +1 more source
DFAS-EIR Case 001: DFAS-CP Rejected by IPM with Unsubstantiated Ethical Allegation
This case report documents DFAS-EIR Case 001 — a serious breach of editorial ethics by the journal Information Processing & Management (Elsevier), which rejected a governance-compliant manuscript (DFAS–CP) without peer review, evidence, or due process.openaire +1 more source
RALE-DFA: An Efficient DFA Compression Method for Regular Expression Matching
International Journal of Digital Content Technology and its Applications, 2012Huanyun Wang - +3 more
openaire +1 more source

