نتایج جستجو برای: distinguishing attacks

تعداد نتایج: 86712  

2004
Yi Lu Serge Vaudenay

We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correlations is formulated by a recursive expression, which makes it easier to calculate correlations of the finite state machine output sequences up to 26 bits for E0 and allows us to verify the two known correlations to be...

2012
Asli Bay Atefeh Mashatan Serge Vaudenay

Iterated attacks are comprised of iterating adversaries who can make d plaintext queries, in each iteration to compute a bit, and are trying to distinguish between a random cipher C and the ideal random cipher C∗ based on all bits. In EUROCRYPT ’99, Vaudenay showed that a 2d-decorrelated cipher resists to iterated attacks of order d when iterations make almost no common queries. Then, he first ...

Journal: :IACR Cryptology ePrint Archive 2006
Jongsung Kim

Differential and linear attacks are the most widely used cryptanalytic tools to evaluate the security of symmetric-key cryptography. Since the introduction of differential and linear attacks in the early 1990’s, various variants of these attacks have been proposed such as the truncated differential attack, the impossible differential attack, the square attack, the boomerang attack, the rectangl...

Journal: :Nursing standard (Royal College of Nursing (Great Britain) : 1987) 2014
Christian Duffin

Intensive care nurses will receive training in psychological therapy in a landmark venture to help patients who experience hallucinations, delusions and panic attacks.

Sh Sharifzadeh A Baghaki A Hoseinzadeh A Tabatabaei F Ataei S Babazadeh

The pharmacological treatment of migraine may be acute or preventive. Frequent, Severe, complicated and long lasting migraine attacks, more than 2 attacks in month require prophylaxis. Traditional preventive drugs such as ?-Blockers, antidepressants, calcium blockers and anticonvulsants, despite their documented efficacy, have many side effects. This study was conducted to determine the effect ...

Journal: :journal of cellular and molecular anesthesia 0
omidvar rezae skull base research center, loghman hakim medical center, shahid beheshti university of medical sciences, tehran, iran kurosh gharagozli brain mapping research center, shahid beheshti university of medical sciences, tehran, iran hosseinali jelvehmoghadam anesthesiology research center, loghman hakim medical center, shahid beheshti university of medical sciences, tehran, iran reza goharani anesthesiology research center, loghman hakim medical center, shahid beheshti university of medical sciences, tehran, iran mohammadreza hajiesmaeili anesthesiology research center, loghman hakim medical center, shahid beheshti university of medical sciences, south kargar ave., kamali st., tehran, ir iran. tel: +98-2151025582; +98-9120201734, fax: +98-2155416130

during the past two decades, a variety of serum or cerebrospinal fluid (csf) biochemical markers in daily clinical practice have been recommended to diagnose and monitor diverse diseases or pathologic situations. it will be essential to develop a panel of biomarkers, to be suitable for evaluation of treatment efficacy, representing distinct phases of injury and recovery and consider the tempora...

Journal: :journal of ai and data mining 2013
meysam alikhani mohammad ahmadi livani

mobile ad-hoc networks (manets) by contrast of other networks have more vulnerability because of having nature properties such as dynamic topology and no infrastructure. therefore, a considerable challenge for these networks, is a method expansion that to be able to specify anomalies with high accuracy at network dynamic topology alternation. in this paper, two methods proposed for dynamic anom...

2001
Daniel Bleichenbacher Willi Meier

This paper analyses the stream cipher SSC2 [ZCC00]. We describe some weaknesses and attacks exploiting these weaknesses. The strongest attack needs about 2 words of known key stream and has a time complexity of about 2.

Journal: :مجله علوم اعصاب شفای خاتم 0
ali khazaee department of psychology, faculty of education & psychology, university of mohaghegh ardabili, ardabil, iran. usha barahmand department of psychology, faculty of education & psychology, university of mohaghegh ardabili, ardabil, iran.

panic attacks are discrete episodes of intense fear or discomfort accompanied by symptoms such as palpitations, shortness of breath, sweating, trembling, derealization and a fear of losing control or dying. although panic attacks are required for a diagnosis of panic disorder, they also occur in association with a host of other disorders listed in the 5h version of the diagnostic and statistica...

A unified method for statistical anomaly detection in intrusion detection systems is theoretically introduced. It is based on estimating a dispersion measure of numerical or symbolic data on successive moving windows in time and finding the times when a relative change of the dispersion measure is significant. Appropriate dispersion measures, relative differences, moving windows, as well as tec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید