منابع مشابه
Optimal Resistance Against the Davies and Murphy Attack
In recent years, three main types of attacks have been developed against Feistel-based ciphers, such as DES[1]; these attacks are linear cryptanalysis[2], differential cryptanalysis[3], and the Davies and Murphy attack[4]. Using the discrete Fourier transform, we present here a quantitative criterion of security against the Davies and Murphy attack. Similar work has been done on linear and diff...
متن کاملAttack against Traffic Engineering
As the Internet grows, traffic engineering has become a widely-used technique to control the flow of packets. For the inter-domain routing, traffic engineering relies on configurations of the Border Gateway Protocol (BGP). While it is recognized that the misconfiguration of BGP can cause negative effects on the Internet, we consider attack methods that disable traffic engineering regardless of ...
متن کاملCyber Threats Foresight Against Iran Based on Attack Vector
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
متن کاملEfficacy of dodder vine extract as seed protectant against pulse beetle, Callosobruchus chinensis (Coleoptera: Bruchidae)
The experiment was conducted to find out the efficacy of dodder vine extract as seed protectant against pulse beetle, Callosobruchus chinensis on gram seed in the laboratory of the Department of Entomology, Bangladesh Agricultural University, Mymensingh during the period of February to May, 2009. The concentrations of dodder vine extract were 5, 2 and 1% respectively. Efficacies of these treatm...
متن کاملDifferential Forgery Attack Against LAC
LAC is one of the candidates to the CAESAR competition. In this paper we present a differential forgery attack on LAC. We study the collection of characteristics following a fixed truncated characteristic, in order to obtain a lower bound on the probability of a differential. We show that some differentials have a probability higher than 2−64, which allows a forgery attack on the full LAC. This...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Botanical Gazette
سال: 1916
ISSN: 0006-8071
DOI: 10.1086/331938