نتایج جستجو برای: linear attack

تعداد نتایج: 559859  

حسینی , سیدحمزه, رضازاده , رضا, کریمانی , مهران,

Background and purpose : Since Panic attack is associated with some sotamic symptoms such as, tachycardia, heart beat, dyspenea etc. Generally panic attack makes patients refer to hospital. Ôn this basis, in this Study, prevalence rate of panic disorder, rate of anxiety in the patients under pulmonary performance test referring to Ïmam khomeini hospital of sari were studied in 2000. Materi...

Journal: :نشریه پرستاری ایران 0
سلوا نیکپور nikpoor, s

most of the patients imagine that chest pain is not sign of heart attack. but, may be pain is not sign of heart attack. pain source may be from pulmonary, stomach, intestinal, psychologic or musculoskeletal problems. from these factors, when two or more factors combine to each other, similar signs are happen. all of these factors harden diagnosis of chest pain reason. only with separation of pe...

Ahmet Cagdas Acara Mehtap Bulut, Muhittin İşsever Mustafa Bolatkale, Ulaş Karaoğlu

 Statins are commonly used drugs in the treatment of hyperlipidemia (HL), despite some undesirable side effects. These range from mild symptoms such as myopathy, muscle weakness and myalgia to severe muscle weakness associated with chronic myopathy and acute renal failure (ARF) as a result of rhabdomyolysis. The most serious and deadly side effect of statins is rhabdomyolysis. The case presente...

2007
Sondre Rønjom Guang Gong Tor Helleseth

The filter generator consists of a linear feedback shift register (LFSR) and a Boolean filtering function that combines some bits from the shift register to create a key stream. A new attack on the filter generator has recently been described by Rønjom and Helleseth [6]. This paper gives an alternative and extended attack to reconstruct the initial state of the LFSR using the underlying subspac...

Journal: :IACR Cryptology ePrint Archive 2015
Virginie Lallemand María Naya-Plasencia

A new method for reducing the internal state size of stream cipher registers has been proposed in FSE 2015, allowing to reduce the area in hardware implementations. Along with it, an instantiated proposal of a cipher was also proposed: Sprout. In this paper, we analyze the security of Sprout, and we propose an attack that recovers the whole key more than 2 times faster than exhaustive search an...

2007
Eli Biham Orr Dunkelman Nathan Keller

IDEA is a 64-bit block cipher with 128-bit keys introduced by Lai and Massey in 1991. IDEA is one of the most widely used block ciphers, due to its inclusion in several cryptographic packages, such as PGP. Since its introduction in 1991, IDEA has withstood extensive cryptanalytic effort, but no attack was found on the full (8.5-round) variant of the cipher. In this paper we present the first kn...

Journal: :IEEE Trans. Computers 2003
Gaël Rouvroy François-Xavier Standaert Jean-Jacques Quisquater Jean-Didier Legat

In its basic version, linear cryptanalysis is a known-plaintext attack that uses a linear relation between input-bits, outputbits, and key-bits of an encryption algorithm that holds with a certain probability. If enough plaintext-ciphertext pairs are provided, this approximation can be used to assign probabilities to the possible keys and to locate the most probable one. In 1993, Matsui applied...

2005
Pierre-Alain Fouque Louis Granboulan Jacques Stern

In this paper we propose a novel cryptanalytic method against multivariate schemes, which adapts differential cryptanalysis to this setting. In multivariate quadratic systems, the differential of the public key is a linear map and has invariants such as the dimension of the kernel. Using linear algebra, the study of this invariant can be used to gain information on the secret key. We successful...

Journal: :IACR Cryptology ePrint Archive 2016
Dibyendu Roy Sourav Mukhopadhyay

In this paper we obtain a weakness in the design specification of ACORN, which is a competitor of CAESAR competition. We show that there exists a probabilistic linear relation between message bits and ciphertext bits, which holds with probability greater than 12 . This is the first paper which finds a probabilistic linear relation between message and corresponding ciphertext bits of ACRON, and ...

Journal: :JCM 2016
Kai Zhang Jie Guan Bin Hu

—In recent two years, zero correlation linear cryptanalysis has shown its great potential in cryptanalysis and it has proven to be effective against massive ciphers. LEA is a block cipher proposed by Deukjo Hong, who is the designer of an ISO standard block cipher HIGHT. This paper evaluates the security level on LEA family ciphers against zero correlation linear cryptanalysis. Firstly, we ide...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید