搜索结果: 1-15 共查到“attacks”相关记录824条 . 查询时间(0.078 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:A LASSO-based Detection and Identification Method on Actuator Integrity Attacks in Remote Control Systems
LASSO 远程控制系统 执行器 完整性 攻击检测 识别方法
2023/4/28
Using adversarial attacks to refine molecular energy predictions(图)
对抗性攻击 分子能量预测 量化神经网络 分子能量 不确定性
2023/6/7
Spotting — and hearing — heart attacks before they strike
new imaging technique atherosclerotic plaque ultrasonic
2021/8/11
If heart attacks blared a warning signal, patients would have a better chance of avoiding them. That's the idea behind a new imaging technique.
Modern cryptography requires the ability to securely generate pseudorandom numbers. However, despite decades of work on side channel attacks, there is little discussion of their application to pseudor...
Security of Symmetric Primitives against Key-Correlated Attacks
Key-correlated attack related-key attack key-dependent-message attack
2019/9/5
We study the security of symmetric primitives against key-correlated attacks (KCA), whereby an adversary can arbitrarily correlate keys, messages, and ciphertexts. Security against KCA is required whe...
Substitution Attacks against Message Authentication
Algorithm Substitution Attacks Authentication Mass Surveillance
2019/9/3
This work introduces Algorithm Substitution Attacks (ASAs) on message authentication schemes. In light of revelations concerning mass surveillance, ASAs were initially introduced by Bellare, Paterson ...
Vectorized linear approximations for attacks on SNOW 3G
SNOW 3G Stream Cipher 5G Mobile System Security
2019/9/3
SNOW 3G is a stream cipher designed in 2006 by ETSI/SAGE, serving in 3GPP as one of the standard algorithms for data confidentiality and integrity protection. It is also included in the 4G LTE standar...
Ci-Lock: Cipher Induced Logic Locking Resistant Against SAT Attacks
Logic locking Block cipher Hardware obfuscation
2019/8/30
Protection of intellectual property (IP) cores is one of the most practical security concern for modern integrated circuit (IC) industry. Albeit being well-studied from a practical perspective, the pr...
Using SMT Solvers to Automate Chosen Ciphertext Attacks
Boolean Satisfiability Satisfiability Modulo Theories Application
2019/8/26
In this work we investigate the problem of automating the development of adaptive chosen ciphertext attacks on systems that contain vulnerable format oracles. Unlike previous attempts, which simply au...
Security of Hedged Fiat-Shamir Signatures under Fault Attacks
signature schemes fault attacks Fiat-Shamir signatures
2019/8/22
Deterministic generation of per-signature randomness has been a widely accepted solution to mitigate the catastrophic risk of randomness failure in Fiat-Shamir type signature schemes. However, recent ...
Generic Side-channel attacks on CCA-secure lattice-based PKE and KEM schemes
Lattice based cryptography side-channel attacks CCA transformation
2019/8/21
In this article, we demonstrate practical side-channel assisted chosen-ciphertext attacks (CCA) over multiple CCA-secure lattice-based public-key encryption schemes (PKE) and key-encapsulation mechani...
Dynamically Obfuscated Scan Chain To Resist Oracle-Guided Attacks On Logic Locked Design
SAT attack Logic locking Secure scan
2019/8/20
Logic locking has emerged as a promising solution against IP piracy and modification by untrusted entities in the integrated circuit design process. However, its security is challenged by boolean sati...
The specification of Bluetooth and Bluetooth Low Energy includes dedicated encryption key negotiation protocols used by two parties to agree on the entropy of encryption keys. In this work, we show th...
Breach the Gate: Exploiting Observability for Fault Template Attacks on Block Ciphers
Fault attacks PRESEN
2019/8/19
Fault attacks (FA) are one of the potent practical threats to modern cryptographic implementations. Over the years the FA tech- niques have evolved, gradually moving towards the exploitation of device...
Low-Memory Attacks against Two-Round Even-Mansour using the 3-XOR Problem
Even-Mansour Cryptanalysis 3-XOR
2019/8/19
The iterated Even-Mansour construction is an elegant construction that idealizes block cipher designs such as the AES. In this work we focus on the simplest variant, the 2-round Even-Mansour construct...