Results 21 to 30 of about 10,030,622 (339)
Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery
Side Channel Attack (SCA) exploits the physical information leakage (such as electromagnetic emanation) from a device that performs some cryptographic operation and poses a serious threat in the present IoT era.
Satyam Kumar +6 more
semanticscholar +1 more source
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Lingyue Qin +4 more
semanticscholar +1 more source
Impact of water content on minimum miscibility pressure during CO2 flooding in high water-cut reservoirs [PDF]
This study focused on the X block stratum oil, specifically addressing the application of CO2 displacement technology in enhancing oil recovery under high water content conditions.
Zhao Fajun +6 more
doaj +1 more source
The security of operation and maintenance phase in systems that share long-life cycles like weapon systems is of great importance. Even if the system passes the security evaluation at the development stage before release, it can be adversely affected by ...
Sungyong Cha +2 more
doaj +1 more source
Subverting Telegram’s End-to-End Encryption
Telegram is a popular secure messaging service with third biggest user base as of 2021. In this paper, we analyze the security of Telegram’s end-to-end encryption (E2EE) protocol in presence of mass-surveillance.
Benoît Cogliati +2 more
doaj +1 more source
Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128
When analyzing a block cipher, the first step is to search for some valid distinguishers, for example, the differential trails in the differential cryptanalysis and the linear trails in the linear cryptanalysis.
Rui Zong +5 more
semanticscholar +1 more source
Service level agreement framework for differentiated survivability in GMPLS-based IP-over-optical networks [PDF]
In the next generation optical internet, GMPLS based IP-over-optical networks, ISPs will be required to support a wide variety of applications each having their own requirements. These requirements are contracted by means of the SLA. This paper describes
Al-Barrak, S. +5 more
core +1 more source
A Simplified Approach to Recovery Conditions for Low Rank Matrices [PDF]
Recovering sparse vectors and low-rank matrices from noisy linear measurements has been the focus of much recent research. Various reconstruction algorithms have been studied, including $\ell_1$ and nuclear norm minimization as well as $\ell_p ...
Fazel, Maryam +3 more
core +2 more sources
Effect of long-term starvation on the survival, recovery, and carbon utilization profiles of a bovine Escherichia coli O157:H7 isolate from New Zealand [PDF]
The ability to maintain a dual lifestyle of colonizing the ruminant gut and surviving in nonhost environments once shed is key to the success of Escherichia coli O157:H7 as a zoonotic pathogen.
McDonald, Ian R. +3 more
core +2 more sources
This work investigates a generic way of combining two very effective and well-studied cryptanalytic tools, proposed almost 18 years apart, namely the boomerang attack introduced by Wagner in FSE 1999 and the yoyo attack by Ronjom et al. in Asiacrypt 2017.
Mostafizar Rahman, Dhiman Saha, G. Paul
semanticscholar +1 more source

