نتایج جستجو برای: zero padding
تعداد نتایج: 150601 فیلتر نتایج به سال:
Website fingerprinting (WF) is a well-known threat to users' web privacy. New Internet standards, such as QUIC, include padding support defenses against WF. Previous work on QUIC WF only analyzes the effectiveness of when users are behind VPN. Yet, this not how most browse Internet. In paper, we provide comprehensive evaluation QUIC-padding-based directly web, i.e., without VPNs, HTTPS proxies,...
A generalized Davenport-Schinzel sequence is one over a finite alphabet that contains no subsequences isomorphic to a fixed forbidden subsequence. One of the fundamental problems in this area is bounding (asymptotically) the maximum length of such sequences. Following Klazar, let Ex(σ, n) be the maximum length of a sequence over an alphabet of size n avoiding subsequences isomorphic to σ. It ha...
This paper describes very efficient attacks on plain RSA encryption as usually described in textbooks. These attacks exploit side channels caused by implementations that, during decryption, incorrectly make certain assumption on the size of message. We highlight different assumptions that are easily made when implementing plain RSA decryption and present corresponding attacks. These attacks mak...
A common practice to encrypt with RSA is to first apply a padding scheme to the message and then to exponentiate the result with the public exponent; an example of this is OAEP. Similarly, the usual way of signing with RSA is to apply some padding scheme and then to exponentiate the result with the private exponent, as for example in PSS. Usually, the RSA modulus used for encrypting is differen...
Since polybrominated diphenyl ether (PBDE) flame retardants were withdrawn from use in polyurethane foam padding, alternatives including tris(1,3-dichloropropyl) phosphate (TDCIPP) and triphenyl phosphate (TPHP) are now used in consumer goods including furniture, automobiles, carpet padding, and baby products. Like PBDEs, these replacement compounds have been widely found in dust samples from h...
The intra-pulse modulation of radar emitter signals is a key feature for analyzing systems. Traditional methods which require tremendous amount prior knowledge are insufficient to accurately classify the modulations. Recently, deep learning-based methods, especially convolutional neural networks (CNN), have been used in classification signals. However, those two-dimensional CNN-based dimensiona...
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security properties of a cryptosystem, as it limits the ability to build a simulator in the random oracle model without knowledge of the private key. We demonstrate attacks which use decryption failures to recover the private key. ...
We show that the common proof technique of padding a circuit before IO obfuscation is sometimes necessary. That is, assuming indistinguishability obfuscation (IO) and one-way functions exist, we define samplers Sam0, which outputs (aux0, C0), and Sam1, which outputs (aux1, C1) such that: • The distributions (aux0, iO(C0)) and (aux1, iO(C1)) are perfectly distinguishable. • For padding s = poly(...
Hip arthroscopy is commonly used both to diagnose and treat different underlying hip conditions. It may be performed either by a supine or lateral approach. A peroneal post is commonly used with a fracture table in both the supine and lateral positions to provide lateralization and traction of the femur. Adequate distraction of the hip joint may be difficult without the peroneal post. We achiev...
Kriptografi sudah menjadi kebutuhan sehari-hari untuk mengamankan data dari pihak yang tidak bertanggung jawab. CBC (Cipher Block Chaining ) merupakan salah satu mode dalam kriptografi block cipher sering digunakan pengembangan aplikasi. Padding Oracle Attack serangan dapat oleh attacker melakukan proses enkripsi dan dekripsi tanpa mengetahui kuncinya sama sekali. Hal ini ter- jadi karena ada v...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید