Correlation attack

Results: 76



#Item
21Cyberwarfare / Computing / Alert messaging / Attack / Computer network security / Alert correlation / Computer security

Analyzing Intensive Intrusion Alerts Via Correlation Peng Ning, Yun Cui, and Douglas S. Reeves Department of Computer Science North Carolina State University Raleigh, NC , ,

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:14
22Applied mathematics / MUGI / Pseudorandom number generators / Linear feedback shift register / Correlation attack / Random number generation / Statistical randomness / Randomness tests / Linear cryptanalysis / Cryptography / Randomness / Stream ciphers

MUGI Pseudorandom Number Generator Self-evaluation Report Ver. 1.1 Hitachi, Ltdc

Add to Reading List

Source URL: www.hitachi.co.jp

Language: English - Date: 2015-04-05 21:00:45
23A5/1 / Linear feedback shift register / Cellular Message Encryption Algorithm / Py / Correlation attack / RC4 / Cryptography / Stream ciphers / Keystream

Cryptanalysis of ORYX D. Wagner1 , L. Simpson2 , E. Dawson2 , J. Kelsey3 , W. Millan2 , and B. Schneier3 1 University of California, Berkeley

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
24Keystream / Linear feedback shift register / NLFSR / Correlation attack / QUAD / Stream ciphers / Cryptography / Grain

State convergence and keyspace reduction of the Mixer stream cipher Sui-Guan Teo1 , Kenneth Koon-Ho Wong1 , Leonie Simpson1,2 , and Ed Dawson1 1 Information Security Institute,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-12-10 00:26:26
25Side channel attack / Data Encryption Standard / Entropy / Correlation attack / RSA / Cryptanalysis / Cipher / Cryptography / Espionage / Power analysis

Improving the Rules of the DPA Contest Fran¸cois-Xavier Standaert⋆ , Philippe Bulens, Giacomo de Meulenaer, Nicolas Veyrat-Charvillon UCL Crypto Group, Universit´e catholique de Louvain, B-1348 Louvain-la-Neuve. e-ma

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-08 08:57:29
26Measurement / Probability theory / Regression analysis / Normal distribution / Statistical hypothesis testing / Standard deviation / Pearson product-moment correlation coefficient / Errors and residuals in statistics / Variance / Statistics / Statistical inference / Data analysis

Success through confidence: Evaluating the effectiveness of a side-channel attack. Adrian Thillard, Emmanuel Prouff, and Thomas Roche ANSSI, 51, Bd de la Tour-Maubourg, 75700 Paris 07 SP, France .f

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 07:23:23
27Keystream / Maths24 / Games / COMPASS/Sample Code / Stream ciphers / Mega Man X / Correlation attack

Cryptanalysis of WG-7: A Lightweight Stream Cipher Mohammad Ali Orumiehchiha1 , Josef Pieprzyk1 , and Ron Steinfeld2? 1 Center for Advanced Computing – Algorithms and Cryptography, Department of Computing,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-05-29 01:05:15
28Stream ciphers / Correlation attack / Linear feedback shift register / Polynomials / Feedback with Carry Shift Registers / Summation generator / Algebraic equation / Cryptography / Pseudorandom number generators / Mathematics

Algebraic Attacks on Summation Generators Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, and Dukjae Moon National Security Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon, , Korea {dlee,jaeheon,jinhon

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-11-06 19:36:50
29Applied mathematics / MUGI / Pseudorandom number generators / Linear feedback shift register / Correlation attack / Random number generation / Statistical randomness / Randomness tests / Linear cryptanalysis / Cryptography / Randomness / Stream ciphers

MUGI Pseudorandom Number Generator Self-evaluation Report Ver. 1.1 Hitachi, Ltdc

Add to Reading List

Source URL: www.hitachi.com

Language: English - Date: 2015-04-08 23:59:34
30Shark / Great white shark / Outline of sharks / Sharm el-Sheikh shark attacks / Fish / Sharks / Shark attack

Fisheries Occasional Publication No. 109, 2012 A correlation study of the potential risk factors associated with white shark attacks in Western Australian waters

Add to Reading List

Source URL: www.fish.wa.gov.au

Language: English - Date: 2012-11-26 02:33:23
UPDATE