搜索结果: 1-15 共查到“guessing”相关记录15条 . 查询时间(0.078 秒)
The Art of Guessing in Combined Side-Channel Collision Attacks
MDCCF distinguisher voting collision voting
2019/6/13
Recent combined collision attacks have shown promising results for exploiting side-channel leakage information from both divide-and-conquer and analytical distinguishers. However, divide-and-conquer d...
On Renyi Entropies and their Applications to Guessing Attacks in Cryptography
brute force guessing attacks predictability entropy
2018/5/22
We consider single and multiple attacker scenarios in guessing and obtain bounds on various success parameters in terms of Renyi entropies. We also obtain a new derivation of the union bound.
An Efficient Public-Key Searchable Encryption Scheme Secure against Inside Keyword Guessing Attacks
Public Key Authenticated Encryption with Keyword Search Searchable Encryption Keyword Guessing Attack
2018/1/12
How to efficiently search over encrypted data is an important and interesting problem in the cloud era. To solve it, Boneh et al. introduced the notion of public key encryption with keyword search (PE...
Climate change ‘tug of war’ keeps scientists guessing on storm tracks
Climate change tug of war scientists storm tracks
2016/9/12
Storm tracks—regions where storms travel from west to east across oceans and continents driven by the prevailing jet stream—determine weather and climate in middle-latitude places like Chicago and New...
Guessing,Economy,Epidemiology:The HIV/AIDS Hypothesis
Epidemiology Peirce abduction guessing hypothesis medicine sexuality bias
2016/6/15
Of the scientific concepts that the American philosopher, Charles S. Peirce, analyzed in his work, two of the less commonly investigated have been those of guessing and of scientific economy. Peirce a...
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques
Simeck Linear Cryptanalysis Differential Cryptanalysis Linear Hull
2016/1/27
Simeck is a new family of lightweight block ciphers proposed by Yang et al. in CHES'15, which has efficient hardware implementation. In this paper, we find differentials with low hamming weight and hi...
Differential Attacks on Reduced SIMON Versions with Dynamic Key-guessing Techniques
SIMON lightweight block cipher bit condition
2016/1/9
SIMON is a family of lightweight block ciphers which are
designed by the U.S National Security Agency in 2013. It has totally
10 versions corresponding to different block size 2n and key length
lk,...
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-guessing Techniques
Round-Reduced Simon Dynamic Key-guessing Techniques
2015/12/29
Simon is a lightweight block cipher family proposed by NSA in 2013. It has drawn many
cryptanalysts’ attention and varity of cryptanalysis results have been published, including differential,
linear...
The Simeck family of lightweight block ciphers was proposed
in CHES 2015 which combines the good design components from NSA
designed ciphers SIMON and SPECK. Dynamic key-guessing techniques
were pr...
Hat Guessing Games and the Use of Coding for Decentralized Control
Decentralized Control Games
2015/6/19
We study a class of decentralized team decision problems over discrete state spaces with non classical information structures. We present a simple class of problems, where an optimal solution can be o...
Confined Guessing: New Signatures From Standard Assumptions
digital signatures CDH assumption pairing-friendly groups RSA assumption SIS assumption
2013/4/18
We put forward a new technique to construct very efficient and compact signature schemes. Our technique combines several instances of an only mildly secure signature scheme to obtain a fully secure sc...
We introduce the notion of guessing model. This notion is a mean to attribute to accessible cardinals combinatorial properties which can be used in combination with inaccessibility to characterize var...
Public-Key Encryption with Fuzzy Keyword Search withstanding Keyword Guessing Attacks
Public-key encryption with keyword search keyword guessing attack public-key encryption with fuzzy keyword search anonymous identity-based encryption
2010/12/14
With tremendous interests having been attracted, public-key encryption with keyword search (PEKS) achieves the searchability of encrypted keywords without sharing a secret between the sender and the r...
Even though passwords are the most convenient
means of authentication, they bring along themselves
the threat of dictionary attacks. Dictionary attacks may
be of two kinds: online and offline. Whil...
For a mixed quantum state with density matrix $\rho$ there are infinitely many ensembles of pure quantum states, which average to $\rho$. Starting from Laplace principle of insufficient reason (not to...