نتایج جستجو برای: distinguishing attacks

تعداد نتایج: 86712  

2006
Carl Livadas Robert Walsh David Lapsley W. Timothy Strayer

To date, techniques to counter cyber-attacks have predominantly been reactive; they focus on monitoring network traffic, detecting anomalies and cyber-attack traffic patterns, and, a posteriori, combating the cyber-attacks and mitigating their effects. Contrary to such approaches, we advocate proactively detecting and identifying botnets prior to their being used as part of a cyber-attack [12]....

Journal: :IACR Cryptology ePrint Archive 2016
Rauf Mahmudlu Valentina Banciu Lejla Batina Ileana Buhan

Side-channel attacks put the security of the implementations of cryptographic algorithms under threat. Secret information can be recovered by analyzing the physical measurements acquired during the computations and using key recovery distinguishing functions to guess the best candidate. Several generic and model based distinguishers have been proposed in the literature. In this work we describe...

Journal: :IEICE Transactions 2012
Yu Sasaki

This paper presents two types of cryptanalysis on a MerkleDamg̊ard hash based MAC, which computes a MAC value of a message M by Hash(K‖`‖M) with a shared key K and the message length `. This construction is often called LPMAC. Firstly, we present a distinguishingH attack against LPMAC instantiating any narrow-pipe Merkle-Damg̊ard hash function with O(2) queries, which indicates the incorrectness ...

2006
Ueli Maurer Krzysztof Pietrzak Renato Renner

A random system is the abstraction of the input-output behavior of any kind of discrete system, in particular cryptographic systems. Many aspects of cryptographic security analyses and proofs can be seen as the proof that a certain random system (e.g. a block cipher) is indistinguishable from an ideal system (e.g. a random permutation), for different types of distinguishers. This paper presents...

Journal: :Proceedings on Privacy Enhancing Technologies 2022

Distribution inference, sometimes called property infers statistical properties about a training set from access to model trained on that data. inference attacks can pose serious risks when models are private data, but difficult distinguish the intrinsic purpose of machine learning—namely, produce capture distribution. Motivated by Yeom et al.’s membership framework, we propose formal definitio...

Journal: :Int. Arab J. Inf. Technol. 2016
Vetrivel Karuvandan Senthamarai Chellamuthu Shantharajah Periyasamy

Encryption algorithms will transform a human interpretable text block or information in to a non-interpretable block of symbols. The objective of any such encryption algorithm will be making the cipher block more non-interpretable and seemingly random block of symbols. So any cipher block will always be random and will purely be a set of random permutations of symbols. The efforts of distinguis...

2007
Joo Yeon Cho

Stream ciphers are cryptographic primitives that ensure the confidentiality of communications. In this thesis, we study several attacks on stream ciphers. For practical applications, the candidates of stream ciphers of NESSIE and eSTREAM projects are scrutinized. Firstly, the algebraic attacks on SOBER-t32 and SOBER-t16 stream ciphers are performed under the assumption that the stuttering phase...

Journal: :Journal of intelligent systems 2023

Abstract As an important identity authentication method, speaker verification (SV) has been widely used in many domains, e.g., mobile financials. At the same time, existing SV systems are insecure under replay spoofing attacks. Toward a more secure and stable system, this article proposes attack detection system based on deformable convolutional neural networks (DCNNs) time–frequency double-cha...

Journal: :IACR Cryptology ePrint Archive 2009
Nathan Keller Stephen D. Miller

In numerous modern stream ciphers, the internal state consists of a large array of pseudo-random words, and the output key-stream is a relatively simple function of the state. In [16], it was heuristically shown that in various cases this structure may lead to distinguishing attacks on the cipher. In this paper we further investigate this structural attack. We present a rigorous proof of the ma...

Journal: :IACR Cryptology ePrint Archive 2014
Danilo Gligoroski Simona Samardjiska Håkon Jacobsen Sergey Bezzateev

1 Department of Telematics, Norwegian University of Science and Technology (NTNU), Trondheim, NORWAY, {danilog, simonas, hakoja}@item.ntnu.no 2 “Ss Cyril and Methodius” University, Faculty of Computer Science and Engineering (FINKI), Skopje, MACEDONIA [email protected] 3 Saint Petersburg State University of Aerospace Instrumentation, Saint Petersburg, RUSSIA, [email protected] Abstrac...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید