Auswahl der wissenschaftlichen Literatur zum Thema „Higher-order attack“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Inhaltsverzeichnis
Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Higher-order attack" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Zeitschriftenartikel zum Thema "Higher-order attack"
DONG, Le, Wen-Ling WU, Shuang WU und Jian ZOU. „Another Look at the Integral Attack by the Higher-Order Differential Attack“. Chinese Journal of Computers 35, Nr. 9 (2012): 1906. http://dx.doi.org/10.3724/sp.j.1016.2012.01906.
Der volle Inhalt der QuelleTSUNOO, Yukiyasu, Teruo SAITO, Hiroki NAKASHIMA und Maki SHIGERI. „Higher Order Differential Attack on 6-Round MISTY1“. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, Nr. 1 (2009): 3–10. http://dx.doi.org/10.1587/transfun.e92.a.3.
Der volle Inhalt der QuelleSugio, Nobuyuki, Naoki Shibayama und Yasutaka Igarashi. „Higher-order Differential Attack on Reduced-round SLIM“. Journal of Information Processing 32 (2024): 352–57. http://dx.doi.org/10.2197/ipsjjip.32.352.
Der volle Inhalt der QuelleYao, Jian Bo, und Tao Zhang. „Insert Random Time-Delay Defense High Order Side-Channel Attack“. Advanced Engineering Forum 6-7 (September 2012): 169–74. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.169.
Der volle Inhalt der QuelleSUGIO, N., H. AONO, S. HONGO und T. KANEKO. „A Study on Higher Order Differential Attack of KASUMI“. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, Nr. 1 (01.01.2007): 14–21. http://dx.doi.org/10.1093/ietfec/e90-a.1.14.
Der volle Inhalt der QuelleCayrol, Claudette, und Marie-Christine Lagasquie-Schiex. „Logical Encoding of Argumentation Frameworks with Higher-order Attacks and Evidential Supports“. International Journal on Artificial Intelligence Tools 29, Nr. 03n04 (Juni 2020): 2060003. http://dx.doi.org/10.1142/s0218213020600039.
Der volle Inhalt der QuelleZhao, Pu, Pin-yu Chen, Siyue Wang und Xue Lin. „Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent“. Proceedings of the AAAI Conference on Artificial Intelligence 34, Nr. 04 (03.04.2020): 6909–16. http://dx.doi.org/10.1609/aaai.v34i04.6173.
Der volle Inhalt der QuelleChancellor, Dinah. „Higher-Order Thinking: A “Basic” Skill For Everyone“. Arithmetic Teacher 38, Nr. 6 (Februar 1991): 48–50. http://dx.doi.org/10.5951/at.38.6.0048.
Der volle Inhalt der QuelleKaedi, S., M. Doostari und M. B. Ghaznavi-Ghoushchi. „NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA“. Journal of Circuits, Systems and Computers 27, Nr. 12 (22.06.2018): 1850191. http://dx.doi.org/10.1142/s0218126618501918.
Der volle Inhalt der QuelleNarote, Prof Amit, Vamika Zutshi, Aditi Potdar und Radhika Vichare. „D-Dos Attack Prediction Using Machine Learning Algorithms“. International Journal for Research in Applied Science and Engineering Technology 10, Nr. 3 (31.03.2022): 2303–12. http://dx.doi.org/10.22214/ijraset.2022.41131.
Der volle Inhalt der QuelleDissertationen zum Thema "Higher-order attack"
Ouladj, Maamar. „Optimisations des attaques par canaux cachés“. Electronic Thesis or Diss., Paris 8, 2020. http://www.theses.fr/2020PA080019.
Der volle Inhalt der QuelleToday’s digital era connects everything in between through the Internet of Things (IoT). That leads to an omnipresence of embedded systems endowed with cryptographic protocols. Nevertheless, cryptographic protocol implementations leak sensitive information during their execution. The field of Side-channel attacks (SCA) aims to analyze this leaked information, in order to recover the secret parameters of the protocols.As stated in the SCA literature, according to the adversary abilities (knowing or not the leakage model of the device, having or not a copy of this target device . . . ) the optimal attack is either the Correlation Power Analysis (CPA), Mutual Information Analysis (MIA), Linear regression Analysis (LRA) or the Template attacks (TA). A first contribution of this thesis is the introduction of a new chosen message strategy to improve the CPA success rate.Instead of carrying out an SCA straightforwardly on the rough traces, one can carry it out using the averaged leakage per message value. Using this coalescence one can reduce significantly the SCAs’ complexities, while these attacks with and without coalescence are asymptotically equivalent (which is proven in the current thesis, for the first time).Using the Walsh-Hadamard Transform (WHT), one can speed up the correlation power analysis (CPA) from a quadratic to a quasi-linear complexity, under certain conditions. In this thesis we first generalize the use of this spectral approach for any situation. Consequently, using both of the coalescence principal, the spectral approach, and others optimizations, we provide several improvements of the implementation complexity in both of CPA, LRA and the Template attacks
Ocampo, Mascaró Javier, Salazar Vera Jimena Silva und Costa Bullón Abilio da. „Correlación entre conocimientos sobre consecuencias de la obesidad y grado de actividad física en universitarios“. Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2015. http://hdl.handle.net/10757/621624.
Der volle Inhalt der QuelleDeptová, Lucie. „Vztah útoků odvozených od vyšších stupňů a CCZ ekvivalence“. Master's thesis, 2016. http://www.nusl.cz/ntk/nusl-352686.
Der volle Inhalt der QuelleBücher zum Thema "Higher-order attack"
Latour, Melinda. Santana and the Metaphysics of Tone. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199985227.003.0010.
Der volle Inhalt der QuelleCraig, Paul, und Gráinne de Búrca. 4. Instruments and the Hierarchy of Norms. Oxford University Press, 2015. http://dx.doi.org/10.1093/he/9780198714927.003.0004.
Der volle Inhalt der QuelleElliott III, William, und Melinda K. Lewis. Student Debt. ABC-CLIO, LLC, 2017. http://dx.doi.org/10.5040/9798216020462.
Der volle Inhalt der QuelleDickinson, Kay, Alisa Perren, Michael Curtin, Marwan M. Kraidy, Michael Keane, Darrell Davis, Anne Jäckel et al. Supply Chain Cinema. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781839024658.
Der volle Inhalt der QuelleBuchteile zum Thema "Higher-order attack"
Moriai, Shiho, Takeshi Shimoyama und Toshinobu Kaneko. „Higher Order Differential Attack Using Chosen Higher Order Differences“. In Selected Areas in Cryptography, 106–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48892-8_9.
Der volle Inhalt der QuelleTakhar, Gourav, Ramesh Karri, Christian Pilato und Subhajit Roy. „HOLL: Program Synthesis for Higher Order Logic Locking“. In Tools and Algorithms for the Construction and Analysis of Systems, 3–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99524-9_1.
Der volle Inhalt der QuelleIwata, Tetsu, und Kaoru Kurosawa. „Probabilistic Higher Order Differential Attack and Higher Order Bent Functions“. In Advances in Cryptology - ASIACRYPT’99, 62–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-48000-6_7.
Der volle Inhalt der QuelleHatano, Yasuo, Hiroki Sekine und Toshinobu Kaneko. „Higher Order Differential Attack of Camellia(II)“. In Selected Areas in Cryptography, 129–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36492-7_10.
Der volle Inhalt der QuelleKrämer, Juliane. „Higher-Order Fault Attacks Against Pairing Computations“. In Why Cryptography Should Not Rely on Physical Attack Complexity, 79–101. Singapore: Springer Singapore, 2015. http://dx.doi.org/10.1007/978-981-287-787-1_5.
Der volle Inhalt der QuelleMoriai, Shiho, Takeshi Shimoyama und Toshinobu Kaneko. „Higher Order Differential Attack of a CAST Cipher“. In Fast Software Encryption, 17–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-69710-1_2.
Der volle Inhalt der QuelleHatano, Yasuo, Hidema Tanaka und Toshinobu Kaneko. „An Optimized Algebraic Method for Higher Order Differential Attack“. In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 61–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44828-4_8.
Der volle Inhalt der QuelleAlTawy, Riham, Mohamed Tolba und Amr M. Youssef. „A Higher Order Key Partitioning Attack with Application to LBlock“. In Lecture Notes in Computer Science, 215–27. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18681-8_17.
Der volle Inhalt der QuelleWatanabe, Dai, Yasuo Hatano, Tsuyoshi Yamada und Toshinobu Kaneko. „Higher Order Differential Attack on Step-Reduced Variants of Luffa v1“. In Fast Software Encryption, 270–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13858-4_15.
Der volle Inhalt der QuelleTanaka, Hidema, Kazuyuki Hisamatsu und Toshinobu Kaneko. „Strength of ISTY1 without FL Function for Higher Order Differential Attack“. In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 221–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46796-3_22.
Der volle Inhalt der QuelleKonferenzberichte zum Thema "Higher-order attack"
Lerman, Liran, Nikita Veshchikov, Stjepan Picek und Olivier Markowitch. „Higher order side-channel attack resilient S-boxes“. In CF '18: Computing Frontiers Conference. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3203217.3206428.
Der volle Inhalt der QuelleNateghi, Shamila, Yuri Shtessel, R. J. Rajesh und Siddharth Sankar Das. „Control of Nonlinear Cyber-Physical Systems under Attack Using Higher Order Sliding Mode Observer“. In 2020 IEEE Conference on Control Technology and Applications (CCTA). IEEE, 2020. http://dx.doi.org/10.1109/ccta41146.2020.9206251.
Der volle Inhalt der QuelleKoga, Hiroki, und Kaoru Itabashi. „A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack“. In IH&MMSec '16: ACM Information Hiding and Multimedia Security Workshop. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2909827.2930788.
Der volle Inhalt der QuelleNateghi, Shamila, Yuri Shtessel, Jean-Pierre Barbot und Christopher Edwards. „Cyber Attack Reconstruction of Nonlinear Systems via Higher-Order Sliding-Mode Observer and Sparse Recovery Algorithm“. In 2018 IEEE Conference on Decision and Control (CDC). IEEE, 2018. http://dx.doi.org/10.1109/cdc.2018.8619354.
Der volle Inhalt der QuelleDe Souza, Gustavo Botelho, João Paulo Papa und Aparecido Nilceu Marana. „Efficient Deep Learning Architectures for Face Presentation Attack Detection“. In Conference on Graphics, Patterns and Images. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sibgrapi.est.2020.12992.
Der volle Inhalt der QuelleHerzig, Andreas, und Antonio Yuste Ginel. „Multi-Agent Abstract Argumentation Frameworks With Incomplete Knowledge of Attacks“. In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/265.
Der volle Inhalt der QuelleAlibeigi, Sepideh. „Wind Tunnel Investigation of the Flow Field on Slender Sharp-Edged Half Delta Wings“. In ASME 2010 International Mechanical Engineering Congress and Exposition. ASMEDC, 2010. http://dx.doi.org/10.1115/imece2010-37014.
Der volle Inhalt der QuelleLiu, Junyi, Dawei Cheng und Changjun Jiang. „Preventing Attacks in Interbank Credit Rating with Selective-aware Graph Neural Network“. In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California: International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/675.
Der volle Inhalt der QuellePint, Bruce A., und Raphae¨lle Peraldi. „Factors Affecting Corrosion Resistance of Recuperator Alloys“. In ASME Turbo Expo 2003, collocated with the 2003 International Joint Power Generation Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/gt2003-38692.
Der volle Inhalt der QuelleGordnier, Raymond E., und Peter J. Attar. „Impact of Flexibility on the Aerodynamics of an Aspect Ratio Two Membrane Wing“. In ASME 2012 Fluids Engineering Division Summer Meeting collocated with the ASME 2012 Heat Transfer Summer Conference and the ASME 2012 10th International Conference on Nanochannels, Microchannels, and Minichannels. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/fedsm2012-72296.
Der volle Inhalt der QuelleBerichte der Organisationen zum Thema "Higher-order attack"
Avi-Yonah, Reuven S. Globalization and Tax Competition: Implications for Developing Countries. Inter-American Development Bank, Februar 2001. http://dx.doi.org/10.18235/0008545.
Der volle Inhalt der QuelleShpigel, Muki, Allen Place, William Koven, Oded (Odi) Zmora, Sheenan Harpaz und Mordechai Harel. Development of Sodium Alginate Encapsulation of Diatom Concentrates as a Nutrient Delivery System to Enhance Growth and Survival of Post-Larvae Abalone. United States Department of Agriculture, September 2001. http://dx.doi.org/10.32747/2001.7586480.bard.
Der volle Inhalt der Quelle