Results 11 to 20 of about 264,704 (267)
Research on Network Attack Traffic Detection HybridAlgorithm Based on UMAP-RF
Network attack traffic detection plays a crucial role in protecting network operations and services. To accurately detect malicious traffic on the internet, this paper designs a hybrid algorithm UMAP-RF for both binary and multiclassification network ...
Xiaoyu Du +3 more
doaj +1 more source
Показатели и оценки стойкости блочных шифров относительно статистических атак первого порядка [PDF]
Получены аналитические верхние оценки надежности различающей и, соответственно, «вскрывающей» статистической атаки первого порядка на блочные шифры.
Алексейчук, А.Н. +1 more
core +4 more sources
In this paper we develop a number of generic techniques and algorithms in spectral analysis of large linear approximations for use in cryptanalysis.
Jing Yang +2 more
doaj +1 more source
Distinguishing Attack Against TPypy [PDF]
TPypy is a tweaked version of the Py stream cipher algorithm submitted to eSTREAM. Py uses a kind of processing referred to as a 'rolling array', the mixing of two types of array and one variable, to generate the keystream. TPypy is proposed as a highly secure stream cipher that fixes all of the previously identified weaknesses of Py.
Yukiyasu Tsunoo +3 more
openaire +1 more source
New Attacks from Old Distinguishers Improved Attacks on Serpent
Serpent was originally proposed in 1998 and is one of the most studied block ciphers. In this paper we improve knowledge of its security by providing the current best attack on this cipher, which is a 12-round differential-linear attack with lower data, time and memory complexities than the best previous attacks.
Broll, Marek +6 more
openaire +2 more sources
Special legal protection of the civil name [PDF]
The personal name is the means of distinguishing the person from another person. If an attack on the name of the third party involves a conflict or impersonation of himself, that is a denial of his self, As a result of this - to justify his protection to
Jafar Mohammed Jawad Al Fadhli +1 more
doaj +1 more source
Multidimensional linear distinguishing attacks and Boolean functions [PDF]
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Hermelin, Miia, Nyberg, Kaisa
openaire +4 more sources
Security analysis of linearly filtered NLFSRs
Non-linear feedback shift register (NLFSR) ciphers are cryptographic tools of choice of the industry especially for mobile communication. Their attractive feature is a high efficiency when implemented in hardware or software. However, the main problem of
Orumiehchiha Mohammad Ali +3 more
doaj +1 more source
In this paper, we propose and evaluate a method for generating key-dependent feedback configurations (KDFC) for $\sigma $ -LFSRs. $\sigma $ -LFSRs with such configurations can be applied to any stream cipher that uses a word-based LFSR.
Subrata Nandi +3 more
doaj +1 more source
Quantum Differential Collision Distinguishing Attacks on Feistel Schemes [PDF]
Feistel schemes are important components of symmetric ciphers, which have been extensively studied in the classical setting. We examine the extension methods of differential distinguishers of Feistel key-function and Feistel function-key schemes. The schemes are subjected to quantum differential collision distinguishing attacks based on the methods ...
ZHANG Zhongya, WU Wenling, WANG Bolin
openaire +1 more source

