Weak key

Results: 101



#Item
1Survey methodology / Machine learning algorithms / Sampling techniques / Artificial intelligence / Sampling / Support vector machine / Reinforcement learning / Simple random sample / Learning / Machine learning / Cognition

Self-Practice Imitation Learning from Weak Policy Qing Da, Yang Yu, and Zhi-Hua Zhou National Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China {daq,yuy,zhouzh}@lamda.nju.edu.cn

Add to Reading List

Source URL: cs.nju.edu.cn

Language: English - Date: 2016-01-04 03:15:09
2Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
3Data Encryption Standard / Key schedule / Weak key / Block cipher / GOST / Differential cryptanalysis / Blowfish / Khufu and Khafre / RC5 / Related-key attack / ICE / Cryptanalysis

Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES John Kelsey Bruce Schneier

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2015-12-10 18:36:20
4Data modeling / Entityrelationship model / Data model / Unique key / Database design / Weak entity / EXPRESS / Database / Relational model / Functional dependency / Conceptual model / Relational Model/Tasmania

The Entity-Relationship Unified View of Data PETER PIN-SHAN Massachusetts Model-Toward

Add to Reading List

Source URL: www.inf.unibz.it

Language: English - Date: 2010-10-21 02:48:55
5Spacecraft / Astronomy / Astrophysics / Outer space / Space observatories / Atmosphere of Earth / Terrestrial gamma-ray flash / Reuven Ramaty High Energy Solar Spectroscopic Imager / Fermi Gamma-ray Space Telescope / Lightning / Gamma-ray burst / Gamma ray

Geophysical Research Letters RESEARCH LETTER2015GL067064 Key Points: • A new population of weak TGFs • TGFs might be a common

Add to Reading List

Source URL: wwlln.net

Language: English - Date: 2016-01-03 23:29:38
6

Lockpicking Physical Layer Key Exchange: Weak Adversary Models Invite the Thief Daniel Steinmetzer Matthias Schulz

Add to Reading List

Source URL: www.informatik.tu-darmstadt.de

Language: English - Date: 2015-05-13 06:54:01
    7Cryptography / Modular arithmetic / Cryptographic software / E-commerce / OpenSSL / RSA / Public-key cryptography / Modular exponentiation / Montgomery modular multiplication / Timing attack / Side-channel attack / Data Encryption Standard

    Remote Timing Attacks are Practical David Brumley Stanford University Abstract Timing attacks are usually used to attack weak computing devices such as smartcards. We show that timing

    Add to Reading List

    Source URL: tls.mbed.org

    Language: English
    8Cryptography / Block cipher / BaseKing / 3-Way / Key schedule / Linear cryptanalysis / Cryptanalysis / Data Encryption Standard / VEST / Advanced Encryption Standard / Weak key / Feistel cipher

    Bitslice Ciphers and Power Analysis Attacks Joan Daemen, Michael Peeters and Gilles Van Assche Proton World Intl. Rue Du Planeur 10, B-1130 Brussel, Belgium Email: {daemen.j, peeters.m, vanassche.g}@protonworld.com http:

    Add to Reading List

    Source URL: jda.noekeon.org

    Language: English - Date: 2013-08-28 07:53:16
    9

    UN Photo/Sanniquellie, Liberia Weak formal legal systems are a key feature of most post-conflict states. In this context, a trade-off is often made in favour of broader restorative forms of justice, over more retributiv

    Add to Reading List

    Source URL: www.accord.org.za

    - Date: 2014-06-27 04:56:25
      10

      Random Number Generators: Introduction for Application Developers Key material generation is as important to strong cryptosystems as the algorithms used. Weak random number generators (RNGs) have been known to create

      Add to Reading List

      Source URL: www.nsa.gov

      Language: English - Date: 2014-07-17 09:45:30
        UPDATE