1,171 Hits in 4.0 sec

Distinguishing Attack on SOBER-128 with Linear Masking [chapter]

Joo Yeon Cho, Josef Pieprzyk
2006 Lecture Notes in Computer Science  
We present a distinguishing attack against SOBER-128 with linear masking. We found a linear approximation which has a bias of 2 −8.8 for the non-linear filter.  ...  The probability bias of the quadratic approximation used in the distinguisher is estimated to be equal to O(2 −51.8 ), so that we claim that SOBER-128 is distinguishable from truly random cipher by observing  ...  Distinguishing attack on SOBER-128 with linear masking Recall Equation (2) on NLF.  ... 
doi:10.1007/11780656_3 fatcat:dbi46ah6yndzlpsqpm7ngx2hje

Improved Linear Cryptanalysis of SOSEMANUK [chapter]

Joo Yeon Cho, Miia Hermelin
2010 Lecture Notes in Computer Science  
Since SOSEMANUK claims 128-bit security, our attack would not be a real threat on the security of SOSEMANUK.  ...  We apply the generalized linear masking technique to SOSEMANUK and derive many linear approximations holding with the correlations of up to 2 −25.5 .  ...  The best attack against SOBER-128 is a distinguishing attack using a linear approximation with the correlation of 2 −8.8[6].  ... 
doi:10.1007/978-3-642-14423-3_8 fatcat:5xd7fu3y5zbdph3ad2xo5b7jzi

A Distinguishing Attack of SNOW 2.0 with Linear Masking Method [chapter]

Dai Watanabe, Alex Biryukov, Christophe De Cannière
2004 Lecture Notes in Computer Science  
In this paper we present the application of linear (masking) attack to SNOW 2.0 stream cipher.  ...  Our attack requires 2 225 output words (2 230 bits) and 2 225 steps of analysis to distinguish the output of SNOW 2.0 from a truly random bit sequence.  ...  He pointed out that our experimental result in Table 1 was incorrect, and helped us to correct the values of the mask set and the corresponding biases.  ... 
doi:10.1007/978-3-540-24654-1_16 fatcat:nhchu6rks5cffmn7l5rztqmtwq

Design of a Lightweight Stream Cipher: BOKHARI 256

Prof. M. U. Bokhari, Shabbir Hassan, Aligarh Muslim University
2020 International Journal of Engineering Research and  
BOKHARI 256 has designed using the feature of some well-known stream ciphers like FRUIT, LIZARD, SOBER and Grain 128 to improve the performance.  ...  The cipher BOKHARI 256 uses a 256-bit key and initialization vector (IV) that is known to be safe and can withstand several cryptographic attacks.  ...  attacks, the time-memory trade-off with huge precomputation, correlations attack and linear masking attack.  ... 
doi:10.17577/ijertv9is030509 fatcat:wneqltmcdfburkcop33t2x5qqe

A Chosen IV Attack Against Turing [chapter]

Antoine Joux, Frédéric Muller
2004 Lecture Notes in Computer Science  
In particular, when using Turing with a 256-bit secret key and a 128-bit IV, we present an attack that requires the ability to choose 2 37 IV and then recovers the key with complexity 2 72 , requiring  ...  These weaknesses allow an attacker that chooses the initialization vector (IV) to recover some partial information about the secret key.  ...  Distinguishing Attacks It is also worth noticing that collisions in the PHT can also be used to distinguish Turing from a truly Random Generator with a much smaller complexity than the key recovery attack  ... 
doi:10.1007/978-3-540-24654-1_14 fatcat:i3whhxqvx5hk5p7772ctden2wq

A New Version of the Stream Cipher SNOW [chapter]

Patrik Ekdahl, Thomas Johansson
2003 Lecture Notes in Computer Science  
A few attacks followed, indicating certain weaknesses in the design. In this paper we propose a new version of SNOW, called SNOW 2.0.  ...  AES (or any other block cipher with block length 128 bits) in counter mode, there is an almost trivial distinguishing attack after seeing about 2 64 ciphertext blocks.  ...  Although one might argue about the relevance of such a distinguishing attacks, the attacks do demonstrate some weaknesses in the design.  ... 
doi:10.1007/3-540-36492-7_5 fatcat:6v6qeufxibhs3pdfgqo3dpubl4

Pseudorandom Bit Generation with Asymmetric Numeral Systems [article]

Josef Pieprzyk, Marcin Pawlowski, Pawel Morawiecki, Arash Mahboubi, Jarek Duda, Seyit Camtepe
2022 IACR Cryptology ePrint Archive  
While, their siblings from the second class are very efficient, but security relies on their resistance against known cryptographic attacks.  ...  Security of the second class rests on heuristic arguments. Sadly, PRBG from the first class are inherently inefficient and some PRBG are insecure against quantum attacks.  ...  First PRBG solutions are based on linear feedback registers and linear congruences [16] .  ... 
dblp:journals/iacr/PieprzykPMMDC22 fatcat:7kjjgjmv4nakjd6bqu7fh6ovka

The Odyssey of Entropy: Cryptography

Behrouz Zolfaghari, Khodakhast Bibak, Takeshi Koshiba
2022 Entropy  
In this paper, we present a systematic review on the applications of entropy and related information-theoretical concepts in the design, implementation and evaluation of cryptographic schemes, algorithms  ...  an optimal linear search attack scenario [142] .  ...  Generic distinguishing-H attack aims at distinguishing between different MAC algorithms (e.g., between HMAC and NMAC) to pave the way for more complex attacks.  ... 
doi:10.3390/e24020266 pmid:35205560 pmcid:PMC8870987 fatcat:2vp2bbr4abc2ngsphrybwhfvwu

Revealing Scenes by Inverting Structure From Motion Reconstructions

Francesco Pittaluga, Sanjeev J. Koppal, Sing Bing Kang, Sudipta N. Sinha
2019 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)  
We evaluate our attack algorithm on public datasets [24, 39] and analyze the significance of the point cloud attributes.  ...  We present a privacy attack that reconstructs color images of the scene from the point cloud.  ...  For privacy preservation, these results are sobering.  ... 
doi:10.1109/cvpr.2019.00023 dblp:conf/cvpr/PittalugaKKS19 fatcat:nwuhwlylsfggjpbterhk467usa

The Native American dream in Sherman Alexie's short story "One Good Man"

María Laura Arce Álvarez
2021 Cultura, Lenguaje y Representación  
The purpose of this article is to discuss the idea of an Indian identity and the Native American Dream in Sherman Alexie's short story "One Good Man."  ...  One system promotes wholeness, while the other is based on division and separation. One system promotes a circular, unified field of interaction, while the other is linear and sequential.  ...  Our biggest claim to fame: we were all sober. ( 2000: 219) As it is evident, Alexie points out two aspects associated with the Indian community: survival and alcoholism; one as a success and the other  ... 
doi:10.6035/clr.2021.25.2 fatcat:6abitavkrfd4lhuba7kozmcxq4

On the Role of the Inner State Size in Stream Ciphers

2004 Proceedings of the 4th International Workshop on Pattern Recognition in Information Systems   unpublished
As a consequence, an increasing number of attacks on stream ciphers exploit the (re-)initialisation of large inner states by a weak key schedule algorithm.  ...  Concluding, we ask a number of open questions that may give rise to a new field of research that is concerned with the security of key schedule algorithms.  ...  Examples include increasing the inner state size (e.g. for LILI-128 [9] ) or decreasing the security level (e.g. for Sober-128 [25] ).  ... 
doi:10.5220/0002676702370250 fatcat:ckexejyzzvd6fj42tskvnot67y

Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher [chapter]

Cees J. A. Jansen, Tor Helleseth, Alexander Kholosha
Lecture Notes in Computer Science  
In this paper a construction based on these principles is described.  ...  Version 2 comes as a response to attacks found for the original version of the algorithm.  ...  Guess and Determine Attacks. We have not found any attack of this kind on the proposed cipher. Distinguishing Attacks.  ... 
doi:10.1007/978-3-540-68351-3_17 fatcat:awb3dfi33bewxpxja4webuyf6y

The eighteenth-century historiographic tradition and contemporary 'Everyday IPE'

2012 Review of International Studies  
This paper focuses on Adam Smith's largely sympathetic response to the Rousseauian critique of the moral degeneracy of modern 'economic man'.  ...  Smith united with Rousseau in the belief that their society's bourgeois politeness allowed materialist ideologies to corrupt the moral autonomy of the individual.  ...  always wears a mask.  ... 
doi:10.1017/s0260210511000799 fatcat:fg2mf2snovhjzoiynx3bkmdplm

Intoxication and Aggression

Jeffrey Fagan
1990 Crime and justice  
Research on intoxication and aggression often has overlooked the nonviolent behavior of most substance users, controlled use of substances, and the evidence from other cultures of a weak or nonexistent  ...  Research on the nexus between substance use and aggression consistently has found a complex relation, mediated by the type of substance and its psychoactive effects, personality factors and the expected  ...  However, unlike a linear model, these relations also have "backward" effects on the same social processes.  ... 
doi:10.1086/449177 fatcat:2kynbumtbfaslnacpoljg3iw4m

The King's Threshold: Manuscript Materials, edited by Declan Kiely, Yeats in Manuscript Series (Ithaca and London: Cornell University Press, 2005), pp. lxi + 620 [chapter]

Richard Allen Cave
2013 Yeats's Mask  
We are on the bridge; that shadow is the tower, And the light proves that he is reading still.  ...  What Robartes has in mind is the following passage: Or let my lamp at midnight hour, Be seen in some high lonely tow'r, Where I may oft outwatch the Bear, With thrice-greatest Hermes, or unsphere The spirit  ...  Smaller structures operate with a similar sense of alternation: Books I, III, and V move in linear patterns, from one numbered Phase, one state between lives, or one historical period to the next.  ... 
doi:10.2307/j.ctt5vjtxj.25 fatcat:vnj53t4ejva2zhj4jwnzohnjri
« Previous Showing results 1 — 15 out of 1,171 results