Results 41 to 50 of about 10,030,622 (339)

On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks and Ciphertext Validity Attacks

open access: yesIEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences, 2021
SUMMARY In this short note, we formally show that Keyed-Homomorphic Public Key Encryption (KH-PKE) is secure against key recovery attacks and ciphertext validity attacks that have been introduced as chosen-ciphertext attacks for homomorphic encryption.
K. Emura
semanticscholar   +1 more source

Fault Attacks on the Authenticated Encryption Stream Cipher MORUS

open access: yesCryptography, 2018
This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the ...
Iftekhar Salam   +4 more
doaj   +1 more source

Computational neurorehabilitation: modeling plasticity and learning to predict recovery [PDF]

open access: yes, 2016
Despite progress in using computational approaches to inform medicine and neuroscience in the last 30 years, there have been few attempts to model the mechanisms underlying sensorimotor rehabilitation.
Burdet, E   +8 more
core   +5 more sources

Cube-Based Cryptanalysis of Subterranean-SAE

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Subterranean 2.0 designed by Daemen, Massolino and Rotella is a Round 2 candidate of the NIST Lightweight Cryptography Standardization process. In the official document of Subterranean 2.0, the designers have analyzed the state collisions in unkeyed ...
Fukang Liu, Takanori Isobe, Willi Meier
doaj   +1 more source

A Durable Magnetic Superhydrophobic Melamine Sponge: For Solving Complex Marine Oil Spills

open access: yesNanomaterials, 2022
The problem of offshore oil leakage has wreaked havoc on the environment and people’s health. A simple and environmentally friendly impregnation method combined with marine mussel bionics was used to address this issue.
Hanmo Si   +5 more
doaj   +1 more source

A Key-Recovery Attack on SOBER-128 [PDF]

open access: yes, 2007
In this talk we consider linear approximations of layered cipher constructions with secret key-dependent constants that are inserted between layers, and where the layers have strong interdependency.
Hakala, Risto, Nyberg, Kaisa
core   +1 more source

Quantum key recovery attack on SIMON32/64

open access: yesCybersecurity, 2021
The quantum security of lightweight block ciphers is receiving more and more attention. However, the existing quantum attacks on lightweight block ciphers only focused on the quantum exhaustive search, while the quantum attacks combined with classical ...
Hui Liu, Li Yang
semanticscholar   +1 more source

Stigma resistance at the personal, peer, and public levels: A new conceptual model. [PDF]

open access: yes, 2017
Stigma resistance is consistently linked with key recovery outcomes, yet theoretical work is limited. This study explored stigma resistance from the perspective of individuals with serious mental illness (SMI).
Cornwell, Madison N.   +6 more
core   +1 more source

Cold Boot Attacks on LUOV

open access: yesApplied Sciences, 2020
This research article assesses the feasibility of cold boot attacks on the lifted unbalanced oil and Vinegar (LUOV) scheme, a variant of the UOV signature scheme.
Ricardo Villanueva-Polanco
doaj   +1 more source

The end of the waterfall: Default resources of central counterparties [PDF]

open access: yes, 2015
Central counterparties (CCPs) have become pillars of the new global financial architecture following the financial crisis of 2008. The key role of CCPs in mitigating counterparty risk and contagion has in turn cast them as systemically important ...
Cont, R
core   +3 more sources

Home - About - Disclaimer - Privacy