搜索结果: 1-15 共查到“知识库 Another Look”相关记录195条 . 查询时间(0.097 秒)
Another Look at Key Randomisation Hypotheses
linear cryptanalysis key randomisation hypotheses
2019/8/26
In the context of linear cryptanalysis of block ciphers, let p0p0 (resp. p1p1) be the probability that a particular linear approximation holds for the right (resp. a wrong) key choice. The standard ri...
Another look at some isogeny hardness assumptions
post-quantum cryptography isogeny-based cryptography cryptanalysis
2019/8/22
The security proofs for isogeny-based undeniable signature schemes have been based primarily on two isogeny hardness assumptions: that the One-Sided Modified SSCDH problem and the One-More SSCDH probl...
Another Look at Byzantine Fault Tolerance
cryptographic protocols Byzantine Fault Tolerance
2019/7/26
We review several solutions for the Byzantine Fault Tolerance (BFT) problem and discuss some aspects that are frequently overlooked by existing literatures. For example, PBFT and HotStuff BFT protocol...
Hardware Implementations of NIST Lightweight Cryptographic Candidates: A First Look
Lightweight cryptography FPGA Authenticated cipher
2019/7/17
Security in the Internet of Things (IoT) is challenging. The need for lightweight yet robust cryptographic solutions suitable for the IoT calls for improved design and implementation of constructs suc...
Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis
Symmetric-key cryptography differential cryptanalysis lightweight cryptography
2018/7/19
Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential charac...
Another Look at Relay and Distance-based Attacks in Contactless Payments
Contactless Payments EMV-adaptations
2018/5/3
Relay attacks on contactless e-payments were demonstrated in 2015. Since, countermeasures have been proposed and Mastercard has recently adopted a variant of these in their specifications. These relay...
A Brief Retrospective Look at the Cayley-Purser Public-key Cryptosystem, 19 Years Later
public-key cryptography cryptanalysis
2018/3/15
The purpose of this paper is to describe and analyze the Cayley-Purser algorithm, which is a public-key cryptosystem proposed by Flannery in 1999. I will present two attacks on it, one of which is app...
Comparison among criteria to define successful weight-loss maintainers and regainers in the Action for Health in Diabetes (Look AHEAD) and Diabetes Prevention Program trials
Diabetes Prevention Program Look AHEAD weight-loss maintenance lifestyle modification weight regain
2018/11/20
Background: Given the low rates of successful weight maintenance after lifestyle-induced weight loss, it is critical to develop approaches that distinguish successful weight-loss maintainers from rega...
High Order Masking of Look-up Tables with Common Shares
Side-channel countermeasure ISW probing model
2017/3/27
Masking is an effective countermeasure against side-channel attacks. In this paper, we improve the efficiency of the high-order masking of look-up tables countermeasure introduced at Eurocrypt 2014, b...
EU-FP7-iMARS: ANALYSIS OF MARS MULTI-RESOLUTION IMAGES USING AUTO-COREGISTRATION, DATA MINING AND CROWD SOURCE TECHNIQUES: PROCESSED RESULTS – A FIRST LOOK
automated DTM and co-registration multi-resolution DTM + ORI CTX HiRISE HRSC webGIS
2016/11/8
Understanding planetary atmosphere-surface exchange and extra-terrestrial-surface formation processes within our Solar System is one of the fundamental goals of planetary science research. There has b...
A Critical Look at the Standard Cosmological Picture
cosmology relativity time simultaneity
2016/6/13
The discovery that the Universe is accelerating in its expansion has brought the basic concept of cosmic expansion into question. An analysis of the evolution of this concept suggests that the paradig...
Higgs Discovery and the Look Elsewhere Effect
Higgs particle discovery condition Bayesianism 5 sigma limit collider physics
2016/6/12
The discovery of the Higgs particle required a signal of five sigma significance. The rigid application of that condition is a convention that disregards more specific aspects of the given experiment....
Another Look at Empirical Equivalence and Underdetermination of Theory Choice
Empirical equivalence underdetermination theory choice non-empirical virtues empirical evidence confirmation special relativity Hendrik Lorentz
2016/6/12
In 1991 Larry Laudan and Jarret Leplin proposed a solution for the problem of predictive equivalence and empirical underdetermination. In this paper we claim that, even though Laudan and Leplin’s reas...
A philosophical look at the Higgs mechanism
Higgs mechanism symmetry breaking gauge symmetries quantum field theory
2016/5/30
On the occasion of the recent experimental detection of a Higgs-type particle at the Large Hadron Collider (LHC) at CERN, the paper reviews philosophical aspects of the Higgs mechanism as the presentl...
Quick look browsing system for Indian Remote Sensing Satellites (IRS) missions
Quick Look Browse Indian Remote sensing satellite (IRS) Payloads
2016/5/20
The system has been installed and operationalised at IRS ground stations besides India at Norman USA
Neustrelitz, Germany and Bangkok, Thailand.