Correlation attack

Results: 76



#Item
1Cryptography / Applied mathematics / Block cipher / Linear cryptanalysis / Cryptanalysis / Differential cryptanalysis / Rebound attack

Automatic tool for impossible differential cryptanalysis and zero-correlation Advisor(s): Christoph Dobraunig Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-09-08 06:00:03
2Cryptography / Applied mathematics / Differential cryptanalysis / Block cipher / Cryptanalysis / Linear cryptanalysis / Data Encryption Standard / Advanced Encryption Standard / Rebound attack / LOKI

Zero-Correlation and Impossible Differential Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
3Computer network security / IP address spoofing / Spoofing attack / Wireless security / Wireless LAN / ARP spoofing / MAC address / IEEE 802.11 / Spoof / Computer network / MAC filtering / Computer security

Protecting Wireless Networks from Identity Theft (Spoofing) using the spatial correlation of received signal strength. GudipudiChandanaTheja MTech Student Dapartment of Computer Science Engineering ST.Mary’s Gr oup of

Add to Reading List

Source URL: www.ijmetmr.com

Language: English - Date: 2015-02-13 08:43:06
4Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
5Cryptography / Stream ciphers / Pseudorandom number generators / Linear-feedback shift register / Correlation attack / Self-shrinking generator / Grain / QUAD / Turing / Shrinking generator / Shift register

Decim, a new stream cipher for hardware applications ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 , T.

Add to Reading List

Source URL: www.rocq.inria.fr

Language: English - Date: 2006-03-23 04:05:33
6Cryptography / Stream ciphers / Linear-feedback shift register / Correlation attack / Grain / Self-shrinking generator / QUAD / Py / ESTREAM

DECIMv2 ∗ C. Berbain1 , O. Billet1 , A. Canteaut2 , N. Courtois3 , B. Debraize3,4 , H. Gilbert1 , L. Goubin4 , A. Gouget5 , L. Granboulan6 , C. Lauradoux2 , M. Minier2 ,

Add to Reading List

Source URL: www.rocq.inria.fr

Language: English - Date: 2006-03-23 04:05:33
7

Building Attack Scenarios through Integration of Complementary Alert Correlation Methods ∗ Peng Ning, Dingbang Xu, Christopher G. Healey, and Robert St. Amant Cyber Defense Laboratory Department of Computer Science Nor

Add to Reading List

Source URL: www.csc.ncsu.edu

Language: English - Date: 2015-07-12 13:03:46
    8Stream ciphers / Pseudorandom number generators / Algebra / Error detection and correction / Binary arithmetic / Linear-feedback shift register / BerlekampMassey algorithm / Correlation attack / Nonlinear feedback shift register / Polynomial / Recurrence relation / Key generator

    Stream cipher A stream cipher is a symmetric cipher which operates with a time-varying transformation on individual plaintext digits. By contrast, block ciphers operate with a fixed transformation on large blocks of plai

    Add to Reading List

    Source URL: www.rocq.inria.fr

    Language: English - Date: 2006-03-23 08:13:04
    9

    LNCSDenial-of-Service Attack Detection Based on Multivariate Correlation Analysis

    Add to Reading List

    Source URL: eprints.eemcs.utwente.nl

    - Date: 2014-11-26 09:04:06
      10Algebra / Cryptography / Functional analysis / Generalized functions / Grain / Keystream / Correlation attack / Recurrence relation / Linear feedback shift register / Mathematics / Mathematical analysis / Stream ciphers

      Distinguishing Attack on Grain Shahram Khazaei┴, Mehdi Hassanzadeh┼, Mohammad Kiaei┴ ┴ ┼

      Add to Reading List

      Source URL: www.ecrypt.eu.org

      Language: English - Date: 2005-10-14 10:29:32
      UPDATE