نتایج جستجو برای: attack construction

تعداد نتایج: 287518  

Journal: :CoRR 2016
Alexey Kurakin Ian J. Goodfellow Samy Bengio

Adversarial examples are malicious inputs designed to fool machine learning models. They often transfer from one model to another, allowing attackers to mount black box attacks without knowledge of the target model’s parameters. Adversarial training is the process of explicitly training a model on adversarial examples, in order to make it more robust to attack or to reduce its test error on cle...

Journal: :مطالعات و تحقیقات اجتماعی ایران 0
علی روحانی مدیرگروه تعاون و رفاه اجتماعی دانشگاه یزد مسعود انبارلو دانشجوی کارشناسی ارشد

during some decades ago, iran hosted much more afghan refugees. different researches, content analyses of speeches, legislatives interviews and different social news show that negative emotions toward afghans exist among some part of people and legislatives, so that they recognize afghans as criminals. therefore, the purpose of this study was social construction of these negative emotions forma...

2009
Yoshinori Aono

In this paper we present a new lattice construction for a lattice based partial key exposure attack for the RSA cryptography. We consider the situation that the RSA secret key d is small and a sufficient amount of the LSBs (least significant bits) of d are known by the attacker. We show that our lattice construction is theoretically more efficient than known attacks proposed in [2, 7]. This is ...

2015
Gu Chunsheng

Recently, Hu and Jia presented an efficient attack on the GGH map. They show that the MPKE and WE based on GGH with public tools of encoding are not secure. Currently, an open problem is to fix GGH with functionality-preserving. We present a new construction of multilinear map using ideal lattices, which maintains functionality of GGH with public tools of encoding, such as applications of GGH-b...

2009
Yoshinori Aono

In this paper we present a new lattice construction for a lattice based partial key exposure attack for the RSA cryptography. We consider the situation that the RSA secret key d is small and a sufficient amount of the LSBs (least significant bits) of d are known by the attacker. We show that our lattice construction is theoretically more efficient than known attacks proposed in [2, 7].

Journal: :Fundam. Inform. 2004
Min-Shiang Hwang Jung-Wen Lo Chia-Hsin Liu

In this manuscript, two key agreement protocols which are resistant to a denial-of-service attack are constructed from a key agreement protocol in [9] provably secure against passive and active attacks. The denial-of-service attack considered is the resource-exhaustion attack on a responder. By the resource-exhaustion attack, a malicious initiator executes a key agreement protocol simultaneousl...

2014
Yuzhe Tang Ling Liu Arun Iyengar Kisung Lee Qi Zhang

In information sharing networks, having a privacy preserving index (or PPI) is critically important for providing efficient search on access controlled content across distributed providers while preserving privacy. An understudied problem for PPI techniques is how to provide controllable privacy preservation, given the innate difference of privacy of the different content and providers. In this...

Journal: :IACR Cryptology ePrint Archive 2014
Itai Dinur Orr Dunkelman Nathan Keller Adi Shamir

Slide attacks use pairs of encryption operations which are slid against each other. Slide with a twist attacks are more sophisticated variants of slide attacks which slide an encryption operation against a decryption operation, and were used in 2000 to attack several cryptosystems, including DESX, the Even-Mansour construction, and Feistel structures with four-round self-similarity. They were f...

2017
Bart Mennink Alan Szepieniec

In the classical world, the XOR of pseudorandom permutations Ek1 ⊕ · · · ⊕ Ekr for r ≥ 2 is a well-established way to design a pseudorandom function with “optimal” security: security up to approximately min{|K|, |X|} queries, where K and X are the key and state space of the block cipher E. We investigate security of this construction against adversaries who have access to quantum computers. We ...

2014
Yuzhe Tang Ling Liu Arun Iyengar Kisung Lee Qi Zhang

In emerging information networks, having a privacy preserving index (or PPI) is critically important for locating information of interest for data sharing across autonomous providers while preserving privacy. An understudied problem for PPI techniques is how to provide controllable privacy preservation, given the innate difference of privacy concerns regarding different data owners. In this pap...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید