A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Distinguishing Attack on SOBER-128 with Linear Masking
[chapter]
2006
Lecture Notes in Computer Science
We present a distinguishing attack against SOBER-128 with linear masking. We found a linear approximation which has a bias of 2 −8.8 for the non-linear filter. ...
The probability bias of the quadratic approximation used in the distinguisher is estimated to be equal to O(2 −51.8 ), so that we claim that SOBER-128 is distinguishable from truly random cipher by observing ...
Distinguishing attack on SOBER-128 with linear masking Recall Equation (2) on NLF. ...
doi:10.1007/11780656_3
fatcat:dbi46ah6yndzlpsqpm7ngx2hje
Improved Linear Cryptanalysis of SOSEMANUK
[chapter]
2010
Lecture Notes in Computer Science
Since SOSEMANUK claims 128-bit security, our attack would not be a real threat on the security of SOSEMANUK. ...
We apply the generalized linear masking technique to SOSEMANUK and derive many linear approximations holding with the correlations of up to 2 −25.5 . ...
The best attack against SOBER-128 is a distinguishing attack using a linear approximation with the correlation of 2 −8.8[6]. ...
doi:10.1007/978-3-642-14423-3_8
fatcat:5xd7fu3y5zbdph3ad2xo5b7jzi
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method
[chapter]
2004
Lecture Notes in Computer Science
In this paper we present the application of linear (masking) attack to SNOW 2.0 stream cipher. ...
Our attack requires 2 225 output words (2 230 bits) and 2 225 steps of analysis to distinguish the output of SNOW 2.0 from a truly random bit sequence. ...
He pointed out that our experimental result in Table 1 was incorrect, and helped us to correct the values of the mask set and the corresponding biases. ...
doi:10.1007/978-3-540-24654-1_16
fatcat:nhchu6rks5cffmn7l5rztqmtwq
Design of a Lightweight Stream Cipher: BOKHARI 256
2020
International Journal of Engineering Research and
BOKHARI 256 has designed using the feature of some well-known stream ciphers like FRUIT, LIZARD, SOBER and Grain 128 to improve the performance. ...
The cipher BOKHARI 256 uses a 256-bit key and initialization vector (IV) that is known to be safe and can withstand several cryptographic attacks. ...
attacks, the time-memory trade-off with huge precomputation, correlations attack and linear masking attack. ...
doi:10.17577/ijertv9is030509
fatcat:wneqltmcdfburkcop33t2x5qqe
A Chosen IV Attack Against Turing
[chapter]
2004
Lecture Notes in Computer Science
In particular, when using Turing with a 256-bit secret key and a 128-bit IV, we present an attack that requires the ability to choose 2 37 IV and then recovers the key with complexity 2 72 , requiring ...
These weaknesses allow an attacker that chooses the initialization vector (IV) to recover some partial information about the secret key. ...
Distinguishing Attacks It is also worth noticing that collisions in the PHT can also be used to distinguish Turing from a truly Random Generator with a much smaller complexity than the key recovery attack ...
doi:10.1007/978-3-540-24654-1_14
fatcat:i3whhxqvx5hk5p7772ctden2wq
A New Version of the Stream Cipher SNOW
[chapter]
2003
Lecture Notes in Computer Science
A few attacks followed, indicating certain weaknesses in the design. In this paper we propose a new version of SNOW, called SNOW 2.0. ...
AES (or any other block cipher with block length 128 bits) in counter mode, there is an almost trivial distinguishing attack after seeing about 2 64 ciphertext blocks. ...
Although one might argue about the relevance of such a distinguishing attacks, the attacks do demonstrate some weaknesses in the design. ...
doi:10.1007/3-540-36492-7_5
fatcat:6v6qeufxibhs3pdfgqo3dpubl4
Pseudorandom Bit Generation with Asymmetric Numeral Systems
[article]
2022
IACR Cryptology ePrint Archive
While, their siblings from the second class are very efficient, but security relies on their resistance against known cryptographic attacks. ...
Security of the second class rests on heuristic arguments. Sadly, PRBG from the first class are inherently inefficient and some PRBG are insecure against quantum attacks. ...
First PRBG solutions are based on linear feedback registers and linear congruences [16] . ...
dblp:journals/iacr/PieprzykPMMDC22
fatcat:7kjjgjmv4nakjd6bqu7fh6ovka
The Odyssey of Entropy: Cryptography
2022
Entropy
In this paper, we present a systematic review on the applications of entropy and related information-theoretical concepts in the design, implementation and evaluation of cryptographic schemes, algorithms ...
an optimal linear search attack scenario [142] . ...
Generic distinguishing-H attack aims at distinguishing between different MAC algorithms (e.g., between HMAC and NMAC) to pave the way for more complex attacks. ...
doi:10.3390/e24020266
pmid:35205560
pmcid:PMC8870987
fatcat:2vp2bbr4abc2ngsphrybwhfvwu
Revealing Scenes by Inverting Structure From Motion Reconstructions
2019
2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR)
We evaluate our attack algorithm on public datasets [24, 39] and analyze the significance of the point cloud attributes. ...
We present a privacy attack that reconstructs color images of the scene from the point cloud. ...
For privacy preservation, these results are sobering. ...
doi:10.1109/cvpr.2019.00023
dblp:conf/cvpr/PittalugaKKS19
fatcat:nwuhwlylsfggjpbterhk467usa
The Native American dream in Sherman Alexie's short story "One Good Man"
2021
Cultura, Lenguaje y Representación
The purpose of this article is to discuss the idea of an Indian identity and the Native American Dream in Sherman Alexie's short story "One Good Man." ...
One system promotes wholeness, while the other is based on division and separation. One system promotes a circular, unified field of interaction, while the other is linear and sequential. ...
Our biggest claim to fame: we were all sober. ( 2000: 219) As it is evident, Alexie points out two aspects associated with the Indian community: survival and alcoholism; one as a success and the other ...
doi:10.6035/clr.2021.25.2
fatcat:6abitavkrfd4lhuba7kozmcxq4
On the Role of the Inner State Size in Stream Ciphers
english
2004
Proceedings of the 4th International Workshop on Pattern Recognition in Information Systems
unpublished
english
As a consequence, an increasing number of attacks on stream ciphers exploit the (re-)initialisation of large inner states by a weak key schedule algorithm. ...
Concluding, we ask a number of open questions that may give rise to a new field of research that is concerned with the security of key schedule algorithms. ...
Examples include increasing the inner state size (e.g. for LILI-128 [9] ) or decreasing the security level (e.g. for Sober-128 [25] ). ...
doi:10.5220/0002676702370250
fatcat:ckexejyzzvd6fj42tskvnot67y
Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher
[chapter]
Lecture Notes in Computer Science
In this paper a construction based on these principles is described. ...
Version 2 comes as a response to attacks found for the original version of the algorithm. ...
Guess and Determine Attacks. We have not found any attack of this kind on the proposed cipher. Distinguishing Attacks. ...
doi:10.1007/978-3-540-68351-3_17
fatcat:awb3dfi33bewxpxja4webuyf6y
The eighteenth-century historiographic tradition and contemporary 'Everyday IPE'
2012
Review of International Studies
This paper focuses on Adam Smith's largely sympathetic response to the Rousseauian critique of the moral degeneracy of modern 'economic man'. ...
Smith united with Rousseau in the belief that their society's bourgeois politeness allowed materialist ideologies to corrupt the moral autonomy of the individual. ...
always wears a mask. ...
doi:10.1017/s0260210511000799
fatcat:fg2mf2snovhjzoiynx3bkmdplm
Intoxication and Aggression
1990
Crime and justice
Research on intoxication and aggression often has overlooked the nonviolent behavior of most substance users, controlled use of substances, and the evidence from other cultures of a weak or nonexistent ...
Research on the nexus between substance use and aggression consistently has found a complex relation, mediated by the type of substance and its psychoactive effects, personality factors and the expected ...
However, unlike a linear model, these relations also have "backward" effects on the same social processes. ...
doi:10.1086/449177
fatcat:2kynbumtbfaslnacpoljg3iw4m
The King's Threshold: Manuscript Materials, edited by Declan Kiely, Yeats in Manuscript Series (Ithaca and London: Cornell University Press, 2005), pp. lxi + 620
[chapter]
2013
Yeats's Mask
We are on the bridge; that shadow is the tower, And the light proves that he is reading still. ...
What Robartes has in mind is the following passage: Or let my lamp at midnight hour, Be seen in some high lonely tow'r, Where I may oft outwatch the Bear, With thrice-greatest Hermes, or unsphere The spirit ...
Smaller structures operate with a similar sense of alternation: Books I, III, and V move in linear patterns, from one numbered Phase, one state between lives, or one historical period to the next. ...
doi:10.2307/j.ctt5vjtxj.25
fatcat:vnj53t4ejva2zhj4jwnzohnjri
« Previous
Showing results 1 — 15 out of 1,171 results