Results 251 to 260 of about 406,684 (268)
Some of the next articles are maybe not open access.
[Differentiated therapy of migraine attack].
Zhurnal nevrologii i psikhiatrii imeni S.S. Korsakova, 200091 patients with migraine were examined in terms of quantitative evaluation of the severity of the attacks. Efficiencies of application of step-by-step or stratification ways of therapy were compared. Indications for the administration of the drugs for "specific" therapy of the attacks of migraine were determined.
A A, Skoromets +2 more
openaire +1 more source
Improved Differential Cache Attacks on SMS4
2013Block ciphers that have Feistel structures are prone to a class of cache attacks known as differential cache attacks, which monitor power or timing side-channels to reveal the secret key. Differential cache attacks were first demonstrated on the block cipher CLEFIA, which has a type-2 generalized Feistel structure.
Phuong Ha Nguyen +3 more
openaire +1 more source
Note on Impossible Differential Attacks
2016While impossible differential cryptanalysis is a well-known and popular cryptanalytic method, errors in the analysis are often discovered and many papers in the literature present flaws. Wishing to solve that, Boura et al.i¾?[1] presented at ASIACRYPT'14 a generic vision of impossible differential attacks with the aim of simplifying and helping the ...
openaire +1 more source
Differential Enumeration Attack on ARIA
Journal of Electronics & Information Technology, 2011Shao-zhen Chen, Lin-zhen Lu
openaire +1 more source
Differentiating Systematic Cyber Attacks from Random Attacks in Space Communication
2023 11th International Symposium on Digital Forensics and Security (ISDFS), 2023Hacer Varol, Timothy W. Kaufman
openaire +1 more source

