Results 31 to 40 of about 264,704 (267)

Improved Distinguishing Attacks on HC-256 [PDF]

open access: yes, 2009
The software-efficient stream cipher HC-256 was proposed by Wu at FSE 2004. Due to its impressive performance, the cipher was also a well-received entrant to the ECRYPT eSTREAM competition. The closely related stream cipher HC-128, also designed by Wu, went on to find a place in the final portfolio of the eSTREAM contest.
Sekar, Gautham, Preneel, Bart
openaire   +1 more source

Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol

open access: yes, 2008
The participant attack is the most serious threat for quantum secret-sharing protocols. We present a method to analyze the security of quantum secret-sharing protocols against this kind of attack taking the scheme of Hillery, Buzek, and Berthiaume (HBB) [
C. H. Bennett   +7 more
core   +1 more source

How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]

open access: yes, 2001
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel   +3 more
core   +3 more sources

Cryptanalysis on the HHSS Obfuscation Arising From Absence of Safeguards

open access: yesIEEE Access, 2018
Indistinguishability Obfuscation (iO) is a hopeful tool which obfuscates a program with the least-possible leakage, and produces various applications including functional encryption and deniable encryption. Recently, Halevi et. al.
Jung Hee Cheon   +3 more
doaj   +1 more source

Machine Learning Attacks‐Resistant Security by Mixed‐Assembled Layers‐Inserted Graphene Physically Unclonable Function

open access: yesAdvanced Science, 2023
Mixed layers of octadecyltrichlorosilane (ODTS) and 1H,1H,2H,2H‐perfluorooctyltriethoxysilane (FOTS) on an active layer of graphene are used to induce a disordered doping state and form a robust defense system against machine‐learning attacks (ML attacks)
Subin Lee   +6 more
doaj   +1 more source

LivDet 2017 Fingerprint Liveness Detection Competition 2017

open access: yes, 2018
Fingerprint Presentation Attack Detection (FPAD) deals with distinguishing images coming from artificial replicas of the fingerprint characteristic, made up of materials like silicone, gelatine or latex, and images coming from alive fingerprints.
Casula, Roberto   +7 more
core   +1 more source

A Novel Hybrid Convolutional Neural Network- and Gated Recurrent Unit-Based Paradigm for IoT Network Traffic Attack Detection in Smart Cities

open access: yesSensors, 2023
Internet of Things (IoT) devices within smart cities, require innovative detection methods. This paper addresses this critical challenge by introducing a deep learning-based approach for the detection of network traffic attacks in IoT ecosystems ...
Brij B. Gupta    +4 more
doaj   +1 more source

Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels

open access: yes, 2019
We show that subtle acoustic noises emanating from within computer screens can be used to detect the content displayed on the screens. This sound can be picked up by ordinary microphones built into webcams or screens, and is inadvertently transmitted to ...
Genkin, Daniel   +3 more
core   +1 more source

Why Quantum Bit Commitment And Ideal Quantum Coin Tossing Are Impossible [PDF]

open access: yes, 1997
There had been well known claims of unconditionally secure quantum protocols for bit commitment. However, we, and independently Mayers, showed that all proposed quantum bit commitment schemes are, in principle, insecure because the sender, Alice, can ...
Ardehali   +28 more
core   +2 more sources

Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing

open access: yesFEBS Letters, EarlyView.
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley   +1 more source

Home - About - Disclaimer - Privacy