Results 31 to 40 of about 257,742 (291)
Entanglement generation secure against general attacks
We present a security proof for establishing private entanglement by means of recurrence-type entanglement distillation protocols over noisy quantum channels. We consider protocols where the local devices are imperfect, and show that nonetheless a confidential quantum channel can be established, and used to e.g.
Pirker, A. +3 more
openaire +4 more sources
Development and Application of Computational Tool Using Local Surface Inclination Methods for Preliminary Analysis of Hypersonic Vehicles [PDF]
This work presents a computational tool for preliminary analysis of hypersonic vehicles, based on local surface inclination methods: the HipeX. This program was developed for reading standard triangulation language (STL) geometry files and calculating ...
Tiago Cavalcanti Rolim +2 more
doaj +3 more sources
New Security Proofs and Complexity Records for Advanced Encryption Standard
Common block ciphers like AES specified by the NIST or KASUMI (A5/3) of GSM are extensively utilized by billions of individuals globally to protect their privacy and maintain confidentiality in daily communications.
Orhun Kara
doaj +1 more source
Formal verification of a software countermeasure against instruction skip attacks [PDF]
Fault attacks against embedded circuits enabled to define many new attack paths against secure circuits. Every attack path relies on a specific fault model which defines the type of faults that the attacker can perform.
Encrenaz, Emmanuelle +3 more
core +7 more sources
GView: A versatile assistant for security researchers
We propose a tool, GView (Generic View), that is tailored to assist the investigation of possible attack vectors by providing guided analysis for a broad range of file types using automatic artifact identification, extraction, inference&coherent ...
Raul Zaharia +3 more
doaj +1 more source
Internal collision attack on Maraca [PDF]
We present an internal collision attack against the new hash function Maraca which has been submitted to the SHA-3 competition. This attack requires 2^{237} calls to the round function and its complexity is lower than the complexity of the generic ...
Canteaut, Anne, Naya-Plasencia, Maria
core +1 more source
A Two-Fold Machine Learning Approach to Prevent and Detect IoT Botnet Attacks
The botnet attack is a multi-stage and the most prevalent cyber-attack in the Internet of Things (IoT) environment that initiates with scanning activity and ends at the distributed denial of service (DDoS) attack.
Faisal Hussain +7 more
doaj +1 more source
A Generalized Birthday Attack [PDF]
We generalize the birthday attack presented by Coppersmith at Crypto'85 which defrauded a Davies-Price message authentication scheme. We first study the birthday paradox and a variant for which some convergence results and related bounds are provided. Secondly, we generalize the Davies-Price scheme and show how the Coppersmith attack can be extended to
Marc Girault +2 more
openaire +1 more source
KASR: A Reliable and Practical Approach to Attack Surface Reduction of Commodity OS Kernels
Commodity OS kernels have broad attack surfaces due to the large code base and the numerous features such as device drivers. For a real-world use case (e.g., an Apache Server), many kernel services are unused and only a small amount of kernel code is ...
A Kurmus +6 more
core +1 more source
Membership Inference Attacks and Generalization
26 pages, 15 figures; added CC-license block icons and links, typos corrected, added reference to ...
Baluta, Teodora +4 more
openaire +2 more sources

