Attack model

Results: 101



#Item
11Cryptography / Software / Computing / IMessage / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Attack model / Messages / RSA / End-to-end encryption / Block cipher mode of operation / Known-plaintext attack

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage Christina Garman Johns Hopkins University

Add to Reading List

Source URL: isi.jhu.edu

Language: English - Date: 2016-03-21 17:23:50
12

Introduction Grain Family of Stream Ciphers Fault model The Attack A Differential Fault Attack on Grain-128a using

Add to Reading List

Source URL: cse.iitkgp.ac.in

Language: English - Date: 2013-10-16 11:27:05
    13Cryptography / Stream ciphers / Advanced Encryption Standard / Differential fault analysis / Block cipher / VEST / Data Encryption Standard / Fault model / Fault injection / Side-channel attack / Common Scrambling Algorithm

    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, SPECIAL ISSUE, VOL. 6, NO. 1, DECEMBERA Combined Design-Time/Test-Time Study of the Vulnerability of Sub-Threshold Devices to

    Add to Reading List

    Source URL: euler.ecs.umass.edu

    Language: English - Date: 2014-03-28 15:45:17
    14

    A Dynamic Model of Traffic on the Web for Analyzing Network Response to Attack John Tomlin IBM Almaden Reseach Center

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2004-05-14 13:40:03
      15Algebraic graph theory / Probability theory / Conductance / Matrices / Connectivity / Graphical model / Sybil attack / Degree distribution / Network science / Graph theory / Mathematics / Networks

      2013 IEEE Symposium on Security and Privacy SoK: The Evolution of Sybil Defense via Social Networks Lorenzo Alvisi UT Austin

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2013-04-05 19:56:40
      16Forking lemma / Random oracle / Preimage attack / Digital signature / Collision resistance / Elliptic Curve DSA / Standard model / MD5 / Birthday attack / Cryptography / Cryptographic hash functions / Schnorr signature

      Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland

      Add to Reading List

      Source URL: www.neven.org

      Language: English - Date: 2012-04-18 06:08:49
      17Cryptography / Quantum information science / Man-in-the-middle attack / Quantum computer / Quantum key distribution / Noisy-storage model / Quantum cryptography / Theoretical computer science / Applied mathematics

      Relativistic quantum cryptography Jed Kaniewski Centre for Quantum Technologies, NUS QuTech, TU Delft 23 March 2015

      Add to Reading List

      Source URL: www.pcqc.fr

      Language: English - Date: 2015-03-25 23:25:36
      18Anger / Empathy / Anxiety / Panic attack / Negotiation / Fear / Panic disorder / Phobia / Rageaholic / Emotions / Mind / Psychiatry

      Loss Model of Mental Illness “Diagnosis” Loss of Reality - Delusions (false beliefs), Hallucination (hearing or seeing things). The person will present as frightened and confused, their story may be hard to follow,

      Add to Reading List

      Source URL: naminc.org

      Language: English - Date: 2015-03-05 15:53:59
      19Mobile marketing / Relationship marketing / Marketing plan / Viral marketing / Internet marketing / Advertising / Sales promotion / Attack marketing / Engagement marketing / Marketing / Business / Promotional model

      2008 VolNo. 02 SNAPSHOT EVENT MARKETING

      Add to Reading List

      Source URL: www.newad.com

      Language: English - Date: 2011-06-14 18:04:32
      20AS3959 / Fire protection / Standards / Computational physics / Bushfires in Australia / Statistical randomness / Monte Carlo method / Black Saturday bushfires / Simulation / Mathematics / Measurement / Probability and statistics

      A stochastic model for assessing bush fire attack on the buildings in bush fire prone areas

      Add to Reading List

      Source URL: www.mssanz.org.au

      Language: English - Date: 2013-01-16 21:18:57
      UPDATE