نتایج جستجو برای: attacking afghanistan

تعداد نتایج: 9950  

Journal: :Cell 2009
Craig B. Thompson

This year the Lasker DeBakey Clinical Research Award will be shared by Brian Druker, Nicholas Lydon, and Charles Sawyers for their development of a targeted molecular therapy for treating chronic myeloid leukemia. Their work demonstrated the ability of drugs directed against cancer-causing oncogenes to turn a rapidly fatal malignancy into a manageable chronic disease.

1998
Stefan Lucks

The standard technique to attack triple encryption is the meet-in-the-middle attack which requires 2 encryption steps. In this paper, more efficient attacks are presented. One of our attacks reduces the overall number of steps to roughly 2. Other attacks optimize the number of encryptions at the cost of increasing the number of other operations. It is possible to break triple DES doing 2 single...

Journal: :IACR Cryptology ePrint Archive 2015
Aanchal Malhotra Isaac E. Cohen Erik Brakke Sharon Goldberg

We explore the risk that network attackers can exploit unauthenticated Network Time Protocol (NTP) traffic to alter the time on client systems. We first discuss how an onpath attacker, that hijacks traffic to an NTP server, can quickly shift time on the server’s clients. Then, we present an extremely low-rate (single packet) denial-of-service attack that an off-path attacker, located anywhere o...

Journal: :Bulletin of the EATCS 1990
Heiner Marxen Jürgen Buntrock

Since T. Rado in 1962 defined the busy beaver game several approaches have used computer technology to search busy beavers or even compute special values of Σ. Σ(5) is not yet known. A new approach to the computation of Σ(5) is presented, together with preliminary results, especially Σ(5)≥4098. This approach includes techniques to reduce the number of inspected Turing machines, to accelerate si...

2009
Michael Hutter Marcel Medwed Daniel M. Hein Johannes Wolkerstorfer

The elliptic curve digital signature algorithm (ECDSA) is used in many devices to provide authentication. In the last few years, more and more ECDSA implementations have been proposed that allow the integration into resource-constrained devices like RFID tags. Their resistance against power-analysis attacks has not been scrutinized so far. In this article, we provide first results of power-anal...

Journal: :Lancet 2006
Ivan Oransky

Sima Samar had just graduated from the Kabul University School of Medicine, in 1982, when the Soviet invasion forced her to flee to central Afghanistan. "I began seeing patients immediately, but I often had to run to my book to identify symptoms and treatments, and then I had to find out whether the necessary medicine was even available. I saw women die every day because of incomplete abortion ...

Journal: :IACR Cryptology ePrint Archive 2017
Stjepan Picek Annelie Heuser Alan Jovic Axel Legay Karlo Knezevic

Profiled side-channel attacks represent the most powerful category of side-channel attacks. In this context, the attacker gains access of a profiling device to build a precise model which is used to attack another device in the attacking phase. Mostly, it is assumed that the attacker has unlimited capabilities in the profiling phase, whereas the attacking phase is very restricted. We step away ...

Journal: :Bulletin of Entomological Research 1922

Journal: :The Canadian Entomologist 1906

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید