نتایج جستجو برای: attack construction

تعداد نتایج: 287518  

Journal: :journal of electrical and computer engineering innovations 2014
fatemeh baghernejad nasour bagheri masoumeh safkhani

in this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by jannati and falahati (so-called jf). we prove that an adversary can recover key bits of jf protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. in addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

اقلیدس, ترانه, نعمتی نیا, محمد صادق, پاینده, علی,

Guess and determine attacks are general attacks on stream ciphers. These attacks are classified into ad-hoc and Heuristic Guess and Determine (HGD) attacks. One of the Advantages of HGD attack algorithm over ad-hoc attack is that it is designed algorithmically for a large class of stream ciphers while being powerful. In this paper, we use auxiliary polynomials in addition to the original equati...

Journal: :The International journal of psycho-analysis 2004
Franco De Masi

This article tries to explain, in the light of some neuroscientific and psychoanalytical considerations, the repetitive pattern of panic attacks. Freud considered the panic attack as an 'actual neurosis' not involving any conflictual process. Recent neuroscientific findings indicate that psychosomatic reactions, set off by a danger situation, depend on the primitive circuit of fear (including t...

Journal: :IACR Cryptology ePrint Archive 2009
Yu Sasaki

In this note, we present a collision attack on AURORA-512, which is one of the candidates for SHA-3. The attack complexity is approximately 2 AURORA-512 operations, which is less than the birthday bound of AURORA-512, namely, 2. Our attack exploits some weakness in the mode of operation. keywords: AURORA, DMMD, collision, multi-collision 1 Description of AURORA-512 We briefly describe the speci...

Journal: :TRANSACTIONS OF THE JAPAN SOCIETY OF MECHANICAL ENGINEERS Series C 2010

M. Abadi, S. Jalili,

Intruders often combine exploits against multiple vulnerabilities in order to break into the system. Each attack scenario is a sequence of exploits launched by an intruder that leads to an undesirable state such as access to a database, service disruption, etc. The collection of possible attack scenarios in a computer network can be represented by a directed graph, called network attack gra...

Cognitive radio (CR) network is an excellent solution to the spectrum scarcity problem. Cooperative spectrum sensing (CSS) has been widely used to precisely detect of primary user (PU) signals. The trustworthiness of the CSS is vulnerable to spectrum sensing data falsification (SSDF) attack. In an SSDF attack, some malicious users intentionally report wrong sensing results to cheat the fusion c...

Journal: :IACR Cryptology ePrint Archive 2013
Mohsen Shakiba Mohammad Dakhilalian Hamid Mala

Biclique attack, is a new cryptanalytic technique which brings new tools from the area of hash functions to the area of block cipher cryptanalysis. Till now, this technique is the only one able to analyze the full-round AES cipher in a single key scenario. In this paper, we introduce non-isomorphic biclique attack, a modified version of the original biclique attack. In this attack we obtain iso...

2011
Sathya Chandran Sundaramurthy Loai Zomlot Xinming Ou

A significant challenge in applying IDS alert correlation in today’s dynamic threat environment is the labor and expertise needed in constructing the correlation model, or the knowledge base, for the correlation process. New IDS signatures capturing emerging threats are generated on a daily basis, and the attack scenarios each captured activity may be involved in are also multitude. Thus it bec...

2002
John M. D. Hill John R. Surdu Scott Lathrop Gregory Conti

There are rarely enough time, laboratory, or equipment resources available for students to explore network construction, provision of services, demand analysis, and information assurance issues. Students need a software tool in which they can rapidly construct networks to satisfy particular scenarios and get rapid feedback. The ability to represent defensive preparations and attacker behaviors ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید