Results 31 to 40 of about 264,704 (267)
Improved Distinguishing Attacks on HC-256 [PDF]
The software-efficient stream cipher HC-256 was proposed by Wu at FSE 2004. Due to its impressive performance, the cipher was also a well-received entrant to the ECRYPT eSTREAM competition. The closely related stream cipher HC-128, also designed by Wu, went on to find a place in the final portfolio of the eSTREAM contest.
Sekar, Gautham, Preneel, Bart
openaire +1 more source
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol
The participant attack is the most serious threat for quantum secret-sharing protocols. We present a method to analyze the security of quantum secret-sharing protocols against this kind of attack taking the scheme of Hillery, Buzek, and Berthiaume (HBB) [
C. H. Bennett +7 more
core +1 more source
How to distinguish between a block cipher and a random permutation by lowering the input entropy [PDF]
IEEE 35th International Carnahan Conference on Security Technology. Londres, 16-19 October 2001A novel cryptanalysis technique is presented, and its suitability for distinguishing a block cipher algorithm or a hash function from a random permutation is ...
González-Tablas, Ana Isabel +3 more
core +3 more sources
Cryptanalysis on the HHSS Obfuscation Arising From Absence of Safeguards
Indistinguishability Obfuscation (iO) is a hopeful tool which obfuscates a program with the least-possible leakage, and produces various applications including functional encryption and deniable encryption. Recently, Halevi et. al.
Jung Hee Cheon +3 more
doaj +1 more source
Mixed layers of octadecyltrichlorosilane (ODTS) and 1H,1H,2H,2H‐perfluorooctyltriethoxysilane (FOTS) on an active layer of graphene are used to induce a disordered doping state and form a robust defense system against machine‐learning attacks (ML attacks)
Subin Lee +6 more
doaj +1 more source
LivDet 2017 Fingerprint Liveness Detection Competition 2017
Fingerprint Presentation Attack Detection (FPAD) deals with distinguishing images coming from artificial replicas of the fingerprint characteristic, made up of materials like silicone, gelatine or latex, and images coming from alive fingerprints.
Casula, Roberto +7 more
core +1 more source
Internet of Things (IoT) devices within smart cities, require innovative detection methods. This paper addresses this critical challenge by introducing a deep learning-based approach for the detection of network traffic attacks in IoT ecosystems ...
Brij B. Gupta +4 more
doaj +1 more source
Synesthesia: Detecting Screen Content via Remote Acoustic Side Channels
We show that subtle acoustic noises emanating from within computer screens can be used to detect the content displayed on the screens. This sound can be picked up by ordinary microphones built into webcams or screens, and is inadvertently transmitted to ...
Genkin, Daniel +3 more
core +1 more source
Why Quantum Bit Commitment And Ideal Quantum Coin Tossing Are Impossible [PDF]
There had been well known claims of unconditionally secure quantum protocols for bit commitment. However, we, and independently Mayers, showed that all proposed quantum bit commitment schemes are, in principle, insecure because the sender, Alice, can ...
Ardehali +28 more
core +2 more sources
Disordered but rhythmic—the role of intrinsic protein disorder in eukaryotic circadian timing
Unstructured domains known as intrinsically disordered regions (IDRs) are present in nearly every part of the eukaryotic core circadian oscillator. IDRs enable many diverse inter‐ and intramolecular interactions that support clock function. IDR conformations are highly tunable by post‐translational modifications and environmental conditions, which ...
Emery T. Usher, Jacqueline F. Pelham
wiley +1 more source

