نتایج جستجو برای: attack construction

تعداد نتایج: 287518  

2011
Nirmala K. Hapukotuwa J. Kenneth Grace

Bamboo is widely grown and utilized as a construction material around the world, particularly in the tropics. At present, there are about 70 bamboo species and varieties recorded from Hawaii. The objective of our study was to determine the relative resistance of six Hawaii-grown bamboo species to attack by Coptotermes formosanus Shiraki and Coptotermes gestroi (Wasmann). Four-week laboratory fe...

Journal: :IACR Cryptology ePrint Archive 2017
Akinori Hosoyamada Yu Sasaki

In this paper, quantum attacks against symmetric-key schemes are presented in which adversaries only make classical queries but use quantum computers for offline computations. Our attacks are not as efficient as polynomial-time attacks making quantum superposition queries, while our attacks use the realistic model and overwhelmingly improve the classical attacks. Our attacks convert a type of c...

Journal: :European Journal of Pure and Applied Mathematics 2023

We propose a new metaheuristic, HmGWOGA-MO, for solving multiobjective optimization problems operating with population of solutions. The method is hybridization the HmGWOGA method, which single objective and ϵ-constraint approach, an aggregation technique. technique one best ways to transform problem many functions into because it works even if has any kind Pareto optimal front. Previously, was...

حسینی , سیدحمزه, رضازاده , رضا, کریمانی , مهران,

Background and purpose : Since Panic attack is associated with some sotamic symptoms such as, tachycardia, heart beat, dyspenea etc. Generally panic attack makes patients refer to hospital. Ôn this basis, in this Study, prevalence rate of panic disorder, rate of anxiety in the patients under pulmonary performance test referring to Ïmam khomeini hospital of sari were studied in 2000. Materi...

2001
David Karig

As evinced by a series of high profile attacks, denial of service (DoS), or prevention of legitimate access to resources, is a threat that demands attention. Of particular concern are distributed attacks, in which an adversary recruits several computers to aid in the attack. The first major distributed denial of service (DDoS) attack brought down the University of Minnesota’s network for three ...

Journal: :Comput. J. 2015
Junqing Gong Xiaolei Dong Zhenfu Cao Jie Chen

The paper presented an identity based encryption (IBE) under selective opening attack (SOA) whose security is almost-tightly related to a set of computational assumptions. Our result is a combination of Bellare, Waters, and Yilek’s method [TCC, 2011] for constructing (not tightly) SOA secure IBE and Hofheinz, Koch, and Striecks’ technique [PKC, 2015] on building almost-tightly secure IBE in the...

2005
Nicholas Hopper

At TCC 2005, Backes and Cachin proposed a new and very strong notion of security for public key steganography: secrecy against adaptive chosen covertext attack (SS-CCA); and posed the question of whether SS-CCA security was achievable for any covertext channel. We resolve this question in the affirmative: SS-CCA security is possible for any channel that admits a secure stegosystem against the s...

2008
Donghoon Chang Mridul Nandi

The classical design principle Merkle-Damg̊ard [13, 6] is scrutinized by many ways such as Joux’s multicollision attack, Kelsey-Schneier second preimage attack etc. In TCC’04, Maurer et al. introduced a strong security notion called as “indifferentiability” for a hash function based on a compression function. The classical design principle is also insecure against this strong security notion whe...

2008
Seung Geol Choi Dana Dachman-Soled Tal Malkin Hoeteck Wee

We show how to transform any semantically secure encryption scheme into a non-malleable one, with a black-box construction that achieves a quasilinear blow-up in the size of the ciphertext. This improves upon the previous non-black-box construction of Pass, Shelat and Vaikuntanathan (Crypto ’06). Our construction also extends readily to guarantee non-malleability under a boundedCCA2 attack, the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید