搜索结果: 1-15 共查到“exploiting”相关记录91条 . 查询时间(0.046 秒)
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers
Fault attacks PRESEN
2019/8/19
Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. Over the years the FA tech- niques have evolved, gradually moving towards the exploitation of device...
Exploiting Determinism in Lattice-based Signatures - Practical Fault Attacks on pqm4 Implementations of NIST candidates
Deterministic Lattice Signatures pqm4 Fault Attack
2019/7/8
In this paper, we analyze the implementation level fault vulnerabilities of deterministic lattice-based signature schemes. In particular, we extend the practicality of skip-addition fault attacks thro...
Measuring, simulating and exploiting the head concavity phenomenon in BKZ
BKZ algorithm simulator
2018/11/14
The Blockwise-Korkine-Zolotarev (BKZ) lattice reduction algorithm is central in cryptanalysis, in particular for lattice-based cryptography. A precise understanding of its practical behavior in terms ...
EXPLOITING MIRRORS IN 3D RECONSTRUCTION OF SMALL ARTEFACTS
Mirrors Range-based modelling Image-based modelling small artefacts
2018/6/4
3D reconstruction of small artefacts is very significant in order to capture the details of the whole object irrespective of the documentation method which is used (Ranged Based or Image Based). Somet...
CLASSIFICATION OF MOBILE LASER SCANNING POINT CLOUDS OF URBAN SCENES EXPLOITING CYLINDRICAL NEIGHBOURHOODS
Point clouds Mobile Laser Scanning Classification Feature extraction Cylindrical Approach 3D Mapping
2018/6/5
This paper presents our work on automated classification of Mobile Laser Scanning (MLS) point clouds of urban scenes with features derived from cylinders around points of consideration. The core of ou...
EXPLOITING MULTI-TEMPORAL SENTINEL-1 SAR DATA FOR FLOOD EXTEND MAPPING
Flood Disaster Sentinel-1 Threshold Change detection Deep learning
2018/4/18
Recently, global climate change is one of the biggest challenges in the world. Dense downfall and following catastrophic floods are one of the most destructive natural hazards among all. Consequences ...
EXPLOITING MULTI-TEMPORAL SENTINEL-1 SAR DATA FOR FLOOD EXTEND MAPPING
Flood Disaster Sentinel-1 Threshold Change detection Deep learning
2018/5/8
Recently, global climate change is one of the biggest challenges in the world. Dense downfall and following catastrophic floods are one of the most destructive natural hazards among all. Consequences ...
Exploiting an HMAC-SHA-1 optimization to speed up PBKDF2
HMAC-SHA-1 Password-Based Key Derivation Function 2 Boyar-Peralta heuristic
2018/1/29
PBKDF2 [27] is a well-known password-based key derivation function. In order to slow attackers down, PBKDF2 introduces CPU-intensive operations based on an iterated pseudorandom function (in our case ...
Exploiting Ineffective Fault Inductions on Symmetric Cryptography
fault attack infective countermeasure fault detection
2018/1/19
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and new techniques for fault attacks and countermeasures have been studied extensively. The vast majority of t...
2018年IUTAM开发工程系统非线性动力学研讨会(IUTAM Symposium on Exploiting nonlinear dynamics for engineering systems)
2018年 IUTAM 开发工程系统非线性动力学 研讨会
2018/1/11
The appearance of nonlinear phenomena used to be perceived as dangerous, with a general tendency to avoid them or control them. This perception has led to intensive research using various approaches a...
There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting
Smartphones PIN Sensor
2017/12/6
A range of zero-permission sensors are found in modern smartphones to enhance user experience. These sensors can lead to unintentional leakage of user private data. In this paper, we combine leakage f...
Improved Division Property Based Cube Attacks Exploiting Low Degree Property of Superpoly
Cube attack Division property MILP
2017/11/10
We apply our technique to stream cipher TRIVIUM and KREYVIUM. For TRIVIUM, benefited from our techniques, we, for the first time, can recover the superpoly of 833-rounds with cube dimension 73, and co...
Attack on AES Implementation Exploiting Publicly-visible Partial Result
Encryption cipher cryptography cryptanalysis
2017/8/22
Although AES is designed to be secure against a wide variety of linear and differential attacks, security ultimately depends on a combination of the engineering implementation and proper application b...
Side-Channel Attacks on BLISS Lattice-Based Signatures -- Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers
BLISS branch tracing SPA
2017/6/5
In this paper, we investigate the security of the BLISS lattice-based signature scheme, one of the most promising candidates for post-quantum-secure signatures, against side-channel attacks. Several w...
FREE GLOBAL DSM ASSESSMENT ON LARGE SCALE AREAS EXPLOITING THE POTENTIALITIES OF THE INNOVATIVE GOOGLE EARTH ENGINE PLATFORM
DSM assessment Google Earth Engine ASTER SRTM geometric accuracy
2017/7/13
The high-performance cloud-computing platform Google Earth Engine has been developed for global-scale analysis based on the Earth observation data. In particular, in this work, the geometric accuracy ...