Filters








81 Hits in 5.9 sec

RQC revisited and more cryptanalysis for Rank-based Cryptography [article]

Loïc Bidoux, Pierre Briaud, Maxime Bros, Philippe Gaborit
2022 arXiv   pre-print
codes; second, we propose new attacks against the Rank Support Learning (RSL), the Non-Homogeneous Rank Decoding (NHRSD), and the Non-Homogeneous Rank Support Learning (NHRSL) problems.  ...  We propose two main contributions: first, we revisit the encryption scheme Rank Quasi-Cyclic (RQC) by introducing new efficient variations, in particular, a new class of codes, the Augmented Gabidulin  ...  Theorem 7 (Combinatorial attack against NHRSL).  ... 
arXiv:2207.01410v1 fatcat:y33u3qv53bfmliyxuwas7wqfgu

A Hexagon-based Key Pre-distribution Scheme for Wireless Sensor Networks

Xiaokang Wang
2014 Journal of Information and Computational Science  
The simulation results show that our scheme performs better in terms of resilience against node capture compared with other existing schemes.  ...  By combining deployment knowledge with deterministic schemes, the scheme can drastically reduce the fraction of compromised links when some nodes are captured.  ...  To improve the attack resistance, Du and Deng combined Blom's scheme with E-G scheme and proposed the multiple-space key pre-distribution scheme, they chosen t matrixes from a symmetric matrix pool with  ... 
doi:10.12733/jics20103578 fatcat:6rbdiiq3yvcbfbqunorrbo2anu

A survey on key management mechanisms for distributed Wireless Sensor Networks

Marcos A. Simplício, Paulo S.L.M. Barreto, Cintia B. Margi, Tereza C.M.B. Carvalho
2010 Computer Networks  
We focus on pre-distribution schemes well-adapted for homogeneous networks (since this is a more general network organization), thus identifying generic features that can improve some of these metrics.  ...  However, the extremely constrained nature of sensors and the potentially dynamic behavior of WSNs hinder the use of key management mechanisms commonly applied in modern networks.  ...  Acknowledgements We would like to thank Mats Näslund for the useful comments and review of this paper.  ... 
doi:10.1016/j.comnet.2010.04.010 fatcat:tdcvw5cilrc5jlafx4ao5zrrmy

A Decade of Lattice Cryptography

Chris Peikert
2016 Foundations and Trends® in Theoretical Computer Science  
Attractive features of lattice cryptography include apparent resistance to quantum attacks (in contrast with most number-theoretic cryptography), high asymptotic efficiency and parallelism, security under  ...  This work surveys most of the major developments in lattice cryptography over the past ten years.  ...  a uniformly random square Ā ∈ Z n×n q in place of the rectangular matrix Ā above.  ... 
doi:10.1561/0400000074 fatcat:5orjj3lrufdalfufl7ju6rnz3e

Improved Zero-Knowledge Identification with Lattices [chapter]

Pierre-Louis Cayrel, Richard Lindner, Markus Rückert, Rosemberg Silva
2010 Lecture Notes in Computer Science  
The best attack on our scheme The best combinatorial attack for finding short lattice vectors [Wag02] has a computational complexity above 2 100 (generalized birthday attack, dividing in 16 groups at  ...  We will show that our scheme is secure against, impersonation under concurrent attacks.  ... 
doi:10.1007/978-3-642-16280-0_1 fatcat:qphlhyww45avzim6wyo7bvnira

Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method

Hisham A. Kholidy
2021 Sensors  
and quantifies the attack cost and security level of the network.  ...  The proposed method considers both the vulnerability and 5G network dynamic factors such as latency and accessibility to find the potential attack graph paths where the attack might propagate in the network  ...  Using the attack graph in Figure 5 , we give a simple demonstration for the decision matrix of the attacker's actions compared to the network indicators (the network components where the attacker may  ... 
doi:10.3390/s22010009 pmid:35009551 pmcid:PMC8747503 fatcat:i4tist6apvcdrd4qvvwthf2xsi

Chasing the AIDS virus

Thomas Lengauer, André Altmann, Alexander Thielen, Rolf Kaiser
2010 Communications of the ACM  
All advertising in ACM Media publications is at the discretion of ACM and is intended to provide financial support for the various activities and services for ACM members.  ...  ACM Media Advertising Policy Communications of the ACM and other ACM Media publications accept advertising in both print and electronic formats.  ...  Acknowledgments The work reported here is the result of extensive interdisciplinary collaboration.  ... 
doi:10.1145/1666420.1666440 fatcat:o2qllqh4tzhh5dzgvnjewl52vq

Heuristic Algorithm for Efficient Data Retrieval Scheduling in the Multichannel Wireless Broadcast Environments

A. Porselvi, S.Brindha Devi
2015 International Journal of Computer Applications Technology and Research  
We compare the efficiency of schemes under CPA (chosen plaintext attack) security only as previous schemes utilized different generalized security transformation from CPA to CCA. [6],[7] Fig.2.  ...  We found that the size can be as small as 672 bits. KP-ABE: In a KP-ABE scheme, the ciphertext encrypting a message is associated with a set of attributes.  ...  An example of them is all-or-nothing transformations (AONTs), which were originally proposed to slow down brute force search attacks against encryption schemes.  ... 
doi:10.7753/ijcatr0405.1001 fatcat:7xpnnpep5vd7hcrmcjr4fvpnq4

Agent-Based Self-Adaptable Context-Aware Network Vulnerability Assessment

F. Jiang, Daoyi Dong, Longbing Cao, M. R. Frater
2013 IEEE Transactions on Network and Service Management  
In this paper, we propose a new agent-based threat awareness assessment strategy inspired by the human immune system to dynamically adapt against attacks.  ...  Experimental results show the efficiency of the proposed biological behaviour-inspired vulnerability awareness system.  ...  The basic idea is that the system is open to any threats and attacks, however, these threats and attacks are to be classified, filtered and controlled dynamically by a functional awareness scheme.  ... 
doi:10.1109/tnsm.2013.090313.120388 fatcat:caotlnitnnbydlj24h4z5pvkb4

Bridging Socially Enhanced Virtual Communities

Venugopal Rao
2013 IOSR Journal of Computer Engineering  
The communication and interactions across the companies has become a common phenomenon.  ...  The architecture of the proposed system is compromising of human activities and also automated activities and it is essentially a service oriented system.  ...  completion of our project titled, 'Video Watermarking scheme based on DWT and PCA for copyright protection'.  ... 
doi:10.9790/0661-0940104 fatcat:zejgpenvqzb7rkchkznv5igfwm

Key agreement: security / division [article]

Daniel R. L. Brown
2021 IACR Cryptology ePrint Archive  
All non-interactive key agreement schemes, where each peer independently determines a single delivery to the other, reduce to this case, because the ability to agree implies the existence of an associative  ...  Ring theory is well-developed and implies efficient division algorithms in some specific rings, such as matrix rings over fields.  ...  If this second scheme is robust enough, then a distinguisher U against k does not immediately result in an attack against the combination of k and E.  ... 
dblp:journals/iacr/Brown21d fatcat:iqndqzypqzexlkbwadyrz7os6m

Sensor Networks for High-Confidence Cyber-Physical Systems

Feng Xia, Tridib Mukherjee, Yan Zhang, Ye-Qiong Song
2011 International Journal of Distributed Sensor Networks  
In the paper "A scalable MAC protocol supporting simple multimedia traffic QoS in WSNs," J.  ...  The authors present a novel scheme called SEF for secure range queries.  ...  of the paper.  ... 
doi:10.1155/2011/245734 fatcat:lswungc2orda5pcqvpyqu7vrna

Cryptanalysis of Block Ciphers with Overdefined Systems of Equations [chapter]

Nicolas T. Courtois, Josef Pieprzyk
2002 Lecture Notes in Computer Science  
Attacks in 2 100 on 128-bit AES: This attack, is a simple adaptation of the second XSL attack, exactly as described here, proposed by Murphy and Robshaw.  ...  At Eurocrypt'00 Shamir and Biryukov studied top-level structural attacks against the SAciphers, i.e. the attacks do not depend on particular S-boxes used [20] .  ...  There are also combinatorial attacks such as square attack, but these will simply not work if N r is sufficiently large.  ... 
doi:10.1007/3-540-36178-2_17 fatcat:pnjhtc5mezcg5ixnvdxy77uy2m

Sponsored Collection | Hangzhou Normal University: Serving China through world-class research and education

2018 Science  
Acknowledgments This paper was supported by the Philosophy and Social Science Foundation of Beijing (13JDWYA006). Hangzhou Normal University's Overseas Talent Recruitment Scheme  ...  Acknowledgments We gratefully acknowledge the National Natural Science Acknowledgments The authors wish to thank the Science and Technology Development Program of Hangzhou (20170533B09) and the Natural  ...  The key concepts of the model are its encryption of the user's identity to enable user anonymity and untraceability; encryption of smart card data to help prevent a smart-card attack; and employment of  ... 
doi:10.1126/science.360.6387.454-b fatcat:s6ypk6lvl5dmzhfom3vokgx7f4

2021 Index IEEE Transactions on Industrial Informatics Vol. 17

2021 IEEE Transactions on Industrial Informatics  
Note that the item title is found only under the primary entry in the Author Index.  ...  The Author Index contains the primary entry for each item, listed under the first author's name.  ...  Sinha, S., +, TII Oct. 2021 6676-6686 On the Resiliency of Power and Gas Integration Resources Against Cyber Attacks.  ... 
doi:10.1109/tii.2021.3138206 fatcat:ulsazxgmpfdmlivigjqgyl7zre
« Previous Showing results 1 — 15 out of 81 results