Results 21 to 30 of about 10,030,622 (339)

Side Channel Attack On Stream Ciphers: A Three-Step Approach To State/Key Recovery

open access: yesIACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
Side Channel Attack (SCA) exploits the physical information leakage (such as electromagnetic emanation) from a device that performs some cryptographic operation and poses a serious threat in the present IoT era.
Satyam Kumar   +6 more
semanticscholar   +1 more source

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny

open access: yesIACR Cryptology ePrint Archive, 2021
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Lingyue Qin   +4 more
semanticscholar   +1 more source

Impact of water content on minimum miscibility pressure during CO2 flooding in high water-cut reservoirs [PDF]

open access: yesE3S Web of Conferences
This study focused on the X block stratum oil, specifically addressing the application of CO2 displacement technology in enhancing oil recovery under high water content conditions.
Zhao Fajun   +6 more
doaj   +1 more source

Blockchain Based Sensitive Data Management by Using Key Escrow Encryption System From the Perspective of Supply Chain

open access: yesIEEE Access, 2020
The security of operation and maintenance phase in systems that share long-life cycles like weapon systems is of great importance. Even if the system passes the security evaluation at the development stage before release, it can be adversely affected by ...
Sungyong Cha   +2 more
doaj   +1 more source

Subverting Telegram’s End-to-End Encryption

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Telegram is a popular secure messaging service with third biggest user base as of 2021. In this paper, we analyze the security of Telegram’s end-to-end encryption (E2EE) protocol in presence of mass-surveillance.
Benoît Cogliati   +2 more
doaj   +1 more source

Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128

open access: yesIACR Transactions on Symmetric Cryptology, 2021
When analyzing a block cipher, the first step is to search for some valid distinguishers, for example, the differential trails in the differential cryptanalysis and the linear trails in the linear cryptanalysis.
Rui Zong   +5 more
semanticscholar   +1 more source

Service level agreement framework for differentiated survivability in GMPLS-based IP-over-optical networks [PDF]

open access: yes, 2007
In the next generation optical internet, GMPLS based IP-over-optical networks, ISPs will be required to support a wide variety of applications each having their own requirements. These requirements are contracted by means of the SLA. This paper describes
Al-Barrak, S.   +5 more
core   +1 more source

A Simplified Approach to Recovery Conditions for Low Rank Matrices [PDF]

open access: yes, 2011
Recovering sparse vectors and low-rank matrices from noisy linear measurements has been the focus of much recent research. Various reconstruction algorithms have been studied, including $\ell_1$ and nuclear norm minimization as well as $\ell_p ...
Fazel, Maryam   +3 more
core   +2 more sources

Effect of long-term starvation on the survival, recovery, and carbon utilization profiles of a bovine Escherichia coli O157:H7 isolate from New Zealand [PDF]

open access: yes, 2014
The ability to maintain a dual lifestyle of colonizing the ruminant gut and surviving in nonhost environments once shed is key to the success of Escherichia coli O157:H7 as a zoonotic pathogen.
McDonald, Ian R.   +3 more
core   +2 more sources

Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos

open access: yesIACR Transactions on Symmetric Cryptology, 2021
This work investigates a generic way of combining two very effective and well-studied cryptanalytic tools, proposed almost 18 years apart, namely the boomerang attack introduced by Wagner in FSE 1999 and the yoyo attack by Ronjom et al. in Asiacrypt 2017.
Mostafizar Rahman, Dhiman Saha, G. Paul
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy