Counter attack

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter

Previous first-order differential power analysis (DPA) attacks have depended on knowledge of the target algorithm’s input or output. This paper describes a first-order DPA attack against AES in counter mode, in which the initial counter and output values are all unknown.

متن کامل

A Counter Based Approach for Mitigation of Grayhole Attack in VANETs: Comparison and Analysis

Vehicular Ad-hoc Networks (VANETs) are highly dynamic network and prone to many kinds of attacks. One class of attacks known as routing misbehavior targets the routing process of the networks. Grayhole attack is a malicious change in the routing process of effected nodes. Such node takes part in routing process but drops the packet when it is required to forward the packet to other nodes. This ...

متن کامل

The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function

Streebog is a new Russian hash function standard. It follows the HAIFA framework as domain extension algorithm and claims to resist recent generic second-preimage attacks with long messages. However, we demonstrate in this article that the specific instantiation of the HAIFA framework used in Streebog makes it weak against such attacks. More precisely, we observe that Streebog makes a rather po...

متن کامل

Counter Attack on Byzantine Generals: Parameterized Model Checking of Fault-tolerant Distributed Algorithms

We introduce an automated parameterized verification method for fault-tolerant distributed algorithms (FTDA). FTDAs are parameterized by both the number of processes and the assumed maximum number of Byzantine faulty processes. At the center of our technique is a parametric interval abstraction (PIA) where the interval boundaries are arithmetic expressions over parameters. Using PIA for both da...

متن کامل

Counter Attack against Free-Riders: Filling a Security Hole in Bittorrent Protocol

eer-to-Peer(P2P) networks are powerful distributed solutions which do not rely on external servers and gather required resources from their users. Therefor fairness is an important feature for designers of these networks. To have a fair network we always want to prevent free-riding. One of the most important file-sharing protocols in P2P is Bittorrent. What separates Bittorrent from other P2P p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Canadian Medical Association Journal

سال: 2006

ISSN: 0820-3946,1488-2329

DOI: 10.1503/cmaj.051546