Results 31 to 40 of about 257,742 (291)

Entanglement generation secure against general attacks

open access: yesNew Journal of Physics, 2017
We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g.
Pirker, A.   +3 more
openaire   +4 more sources

Development and Application of Computational Tool Using Local Surface Inclination Methods for Preliminary Analysis of Hypersonic Vehicles [PDF]

open access: yesJournal of Aerospace Technology and Management, 2020
This work presents a computational tool for preliminary analysis of hypersonic vehicles, based on local surface inclination methods: the HipeX. This program was developed for reading standard triangulation language (STL) geometry files and calculating ...
Tiago Cavalcanti Rolim   +2 more
doaj   +3 more sources

New Security Proofs and Complexity Records for Advanced Encryption Standard

open access: yesIEEE Access, 2023
Common block ciphers like AES specified by the NIST or KASUMI (A5/3) of GSM are extensively utilized by billions of individuals globally to protect their privacy and maintain confidentiality in daily communications.
Orhun Kara
doaj   +1 more source

Formal verification of a software countermeasure against instruction skip attacks [PDF]

open access: yes, 2013
Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model which defines the type of faults that the attacker can perform.
Encrenaz, Emmanuelle   +3 more
core   +7 more sources

GView: A versatile assistant for security researchers

open access: yesSoftwareX
We propose a tool, GView (Generic View), that is tailored to assist the investigation of possible attack vectors by providing guided analysis for a broad range of file types using automatic artifact identification, extraction, inference&coherent ...
Raul Zaharia   +3 more
doaj   +1 more source

Internal collision attack on Maraca [PDF]

open access: yes, 2009
We present an internal collision attack against the new hash function Maraca which has been submitted to the SHA-3 competition. This attack requires 2^{237} calls to the round function and its complexity is lower than the complexity of the generic ...
Canteaut, Anne, Naya-Plasencia, Maria
core   +1 more source

A Two-Fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks

open access: yesIEEE Access, 2021
The botnet attack is a multi-stage and the most prevalent cyber-attack in the Internet of Things (IoT) environment that initiates with scanning activity and ends at the distributed denial of service (DDoS) attack.
Faisal Hussain   +7 more
doaj   +1 more source

A Generalized Birthday Attack [PDF]

open access: yes, 2007
We generalize the birthday attack presented by Coppersmith at Crypto'85 which defrauded a Davies-Price message authentication scheme. We first study the birthday paradox and a variant for which some convergence results and related bounds are provided. Secondly, we generalize the Davies-Price scheme and show how the Coppersmith attack can be extended to
Marc Girault   +2 more
openaire   +1 more source

KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels

open access: yes, 2018
Commodity OS kernels have broad attack surfaces due to the large code base and the numerous features such as device drivers. For a real-world use case (e.g., an Apache Server), many kernel services are unused and only a small amount of kernel code is ...
A Kurmus   +6 more
core   +1 more source

Membership Inference Attacks and Generalization

open access: yesProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
26 pages, 15 figures; added CC-license block icons and links, typos corrected, added reference to ...
Baluta, Teodora   +4 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy