9 Hits in 11.5 sec

Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme [chapter]

Dustin Moody, Ray Perlner, Daniel Smith-Tone
2017 Lecture Notes in Computer Science  
This disparity is especially great for the cubic version of the Simple Matrix Encryption Scheme.  ...  In the last few years multivariate public key cryptography has experienced an infusion of new ideas for encryption.  ...  These provable security claims were undermined in [18] , however, with the presentation of a key recovery attack on a full scale version of the Cubic Simple Matrix encryption scheme.  ... 
doi:10.1007/978-3-319-59879-6_15 fatcat:m2sdxehkuvbxfav2xae3ii4uzy

Security Analysis and Key Modification for ZHFE [chapter]

Ray Perlner, Daniel Smith-Tone
2016 Lecture Notes in Computer Science  
., is one of the few promising candidates for a multivariate public-key encryption algorithm. In this article we extend and expound upon the existing security analysis on this scheme.  ...  We further suggest a modification, ZHF E − , a multivariate encryption scheme which retains the security and performance properties of ZHF E while optimizing key size in this theoretical framework.  ...  In [12] , however, a new and unexpected attack was presented on the ABC simple matrix encryption scheme of [9] .  ... 
doi:10.1007/978-3-319-29360-8_13 fatcat:pzfbzk4nj5hcthtgwqaformwwu

A comprehensive survey on machine learning for networking: evolution, applications and research opportunities

Raouf Boutaba, Mohammad A. Salahuddin, Noura Limam, Sara Ayoubi, Nashid Shahriar, Felipe Estrada-Solano, Oscar M. Caicedo
2018 Journal of Internet Services and Applications  
This survey is original, since it jointly presents the application of diverse ML techniques in various key areas of networking across different network technologies.  ...  In this way, readers will benefit from a comprehensive discussion on the different learning paradigms and ML techniques applied to fundamental problems in networking, including traffic prediction, routing  ...  Acknowledgments We thank the anonymous reviewers for their insightful comments and suggestions that helped us improve the quality of the paper.  ... 
doi:10.1186/s13174-018-0087-2 fatcat:jvwpewceevev3n4keoswqlcacu

An Evolutionary Game-Based Mechanism for Routing P2P Network Flow among Selfish Peers

Fang Zuo, Wei Zhang
2014 Journal of Networks  
The DAIM model can provide richness of nature-inspired adaptation algorithms on a complex distributed computing environment.  ...  DAIM model also considers challenges of autonomic functionalities, where each network's device can make its own decisions on the basis of collected information by the DAIM agents.  ...  Key Synchronization Rule (KSR): Key synchronization mostly depends on the key update methods.  ... 
doi:10.4304/jnw.9.01.10-17 fatcat:tbmafdamk5am7a6ba26gsxzydq

Dagstuhl Reports, Volume 6, Issue 11, November 2016, Complete Issue [article]

The talk summarized the development of kernel methods for machine learning, focusing on the main ideas and some future possibilities: introduction of p.d. kernels within the theory of integral equations  ...  , their use in potential functions methods, in SVM, the general "kernel trick", the observation that kernels can be defined on arbitrary sets of objects, the link to GPs, and finally the idea to represent  ...  In this talk, we first look at the key security pillars behind the attack surface of a distributed system.  ... 
doi:10.4230/dagrep.6.11 fatcat:tfkdfittpjdydfv7ejvk4bvnh4

Dagstuhl Reports, Volume 11, Issue 10, October 2021, Complete Issue [article]

matrix of f.  ...  On the other hand, people did not update their keys after compromise or updated them wrongly (with weaker keys).  ...  attacks.  ... 
doi:10.4230/dagrep.11.10 fatcat:mqui2qttdrdt7p6y3nbkkodoci

New statistical algorithms for the analysis of mass spectrometry time-of- flight mass data with applications in clinical diagnostics [article]

Tim Conrad, Universitätsbibliothek Der FU Berlin, Universitätsbibliothek Der FU Berlin
Special emphasis has been put on designing highly sensitive methods with respect to signal detection.  ...  These distinguishing components that dependent on a particular medical condition are generally called biomarkers.  ...  Public key: The public key is used by the platform server to encrypt communication (initialized by the server) with this worker.  ... 
doi:10.17169/refubium-14645 fatcat:rdto5m4wg5ffjgadfn2fho3tju

Reviewing the low efficiency of protein utilization in heavy preruminant calves – a reductionist approach

Joost J. G. C. van den Borne, Johannes M. A. J. Verdonk, Johan W. Schrama, Walter J. J. Gerrits
2006 Reproduction nutrition development (Print)  
Germination and conjugation of Bacillus thuringiensis in the gut of gnotobiotic rats Wilcks, Andrea; Ørum-Smidt, Lasse; Andrup, L.; Bahl, M.; Hansen, B. M.; Hendriksen, N.  ...  The authors are grateful to the Commission of the European Communities and the FEDER Funds for financial support of this work (Project POCTI/CVT/ 37545/2002).  ...  The experiments showed that the most effective and simple method to influence the rate of alginate matrix dissolving is ultrasound.  ... 
doi:10.1051/rnd:2006011 pmid:16597419 fatcat:zymdhbzqgveexlzkugyozzci7a

Research summit 2022 - Book of abstracts [article]

Artur M.S. Silva, António L. Teixeira, A. Gil Andrade Campos
Assuming a greater return to academia, Research Summit 2022 also adopts a face-to-face model on the first day (plenary) and essentially face-to-face on the following days (presentations by PhD students  ...  It is a forum to foster an important debate among the research community of the University of Aveiro and to increase collaboration, advancing the state of the art and enhancing research efforts on campus  ...  The recovery of the hydrogels also increased from 70.05 ± 3.06% for the formulation 90:10 to 82.63 ± 1.21% for the 60:40 one.  ... 
doi:10.48528/6dz9-d129 fatcat:aox2vn2aebhg7k67wnbdabxc4u