نتایج جستجو برای: distinguishing attacks

تعداد نتایج: 86712  

2016
Frank Weber Karin Jurkat-Rott

Hyperkalemic periodic paralysis (hyperPP) is characterized by attacks of flaccid limb weakness (which may also include weakness of the muscles of the eyes, throat, and trunk), hyperkalemia (serum potassium concentration >5 mmol/L) or an increase of serum potassium concentration of at least 1.5 mmol/L during an attack of weakness and/or provoking/worsening of an attack by oral potassium intake, ...

2004
Håkan Englund Martin Hell Thomas Johansson

In 1985 Siegenthaler introduced the concept of correlation attacks on LFSR based stream ciphers. A few years later Meier and Staffelbach demonstrated a special technique, usually referred to as fast correlation attacks, that is very effective if the feedback polynomial has a special form, namely, if its weight is very low. Due to this seminal result, it is a well known fact that one avoids low ...

2006
Martin Hell Thomas Johansson

We give a simple algorithm that can find biased linear approximations of nonlinear building blocks. The algorithm is useful if the building block is relatively small and exhaustive search is possible. Instead of searching all possible linear relations individually, we show how the most biased relation can be found in just a few steps. As an example we show how we can find a biased relation in t...

1998
Aviad Kipnis Adi Shamir

Several multivariate algebraic signature schemes had been proposed in recent years, but most of them had been broken by exploiting the fact that their secret trapdoors are low rank algebraic structures. One of the few remaining variants is Patarin’s ”Oil & Vinegar” scheme, which is based on a system of n quadratic forms in 2n variables of two flavors (n ”oil” variables and n ”vinegar” variables...

2008
Jacques Patarin Yannick Seurin

Up to now, the design of block ciphers has been mainly driven by heuristic arguments, and little theory is known to constitute a good guideline for the development of their architecture. Trying to remedy this situation, we introduce a new type of design for symmetric cryptographic primitives with high self-similarity. Our design strategy enables to give a reductionist security proof for the pri...

Journal: :IACR Cryptology ePrint Archive 2010
Thomas Peyrin

We present improved cryptanalysis of two second-round SHA-3 candidates: the AESbased hash functions ECHO and Grøstl. We explain methods for building better differential trails for ECHO by increasing the granularity of the truncated differential paths previously considered. In the case of Grøstl, we describe a new technique, the internal differential attack, which shows that when using parallel ...

Journal: :IACR Cryptology ePrint Archive 2017
Victor Cauchois Clément Gomez Reynald Lercier

We consider highly structured truncated differential paths to mount rebound attacks on hash functions based on AES-like permutations. We explain how such differential paths can be computed using a Mixed-Integer Linear Programming approach. Together with the SuperSBox description, this allows us to build a rebound attack with a 6-round inbound phase whereas classical rebound attacks have 4-round...

2009
Tin Can Kevin Bauer Damon McCoy Eric Anderson Markus Breitenbach Greg Grudic Dirk Grunwald Douglas Sicker

802.11 localization algorithms provide the ability to accurately position and track wireless clients thereby enabling location-based services and applications. However, we show that these localization techniques are vulnerable to non-cryptographic attacks where an adversary uses a low-cost directional antenna to appear from the localization algorithm’s perspective to be in another arbitrary loc...

2007
Xin Li Bei Hua Yi Shang Yan Guo Lihua Yue

Most of the state-of-the-art localization algorithms in wireless sensor networks (WSNs) are vulnerable to attacks from malicious or compromised network nodes, whereas the secure localization schemes proposed so far are too complex to be applied to power constrained WSNs. This paper provides a novel secure scheme “Bilateration” which is derived from multilateration but can be calculated more acc...

2001
MARISA REDDY

In the wake of recent school shootings, fear over violence in schools has prompted increased requests for psychologists, educators, and law enforcement professionals to assist in preventing future school violence incidents. We attempt to lay a foundation for developing effective assessment and prevention approaches by first distinguishing planned school-based attacks from other forms of school ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید