Добірка наукової літератури з теми "Higher-order attack"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Higher-order attack".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Higher-order attack":

1

DONG, Le, Wen-Ling WU, Shuang WU, and Jian ZOU. "Another Look at the Integral Attack by the Higher-Order Differential Attack." Chinese Journal of Computers 35, no. 9 (2012): 1906. http://dx.doi.org/10.3724/sp.j.1016.2012.01906.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

TSUNOO, Yukiyasu, Teruo SAITO, Hiroki NAKASHIMA, and Maki SHIGERI. "Higher Order Differential Attack on 6-Round MISTY1." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92-A, no. 1 (2009): 3–10. http://dx.doi.org/10.1587/transfun.e92.a.3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Sugio, Nobuyuki, Naoki Shibayama, and Yasutaka Igarashi. "Higher-order Differential Attack on Reduced-round SLIM." Journal of Information Processing 32 (2024): 352–57. http://dx.doi.org/10.2197/ipsjjip.32.352.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Yao, Jian Bo, and Tao Zhang. "Insert Random Time-Delay Defense High Order Side-Channel Attack." Advanced Engineering Forum 6-7 (September 2012): 169–74. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.169.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Side-channel attack is a non destructive physical attacks method. The current cryptographic algorithms are vulnerable to higher-order side-channel attack. To defense high order Side-channel attack, in this paper, a new countermeasure based on inserting random delay is proposed to secure AES against higher-order side-channel attack. By inserting a redundant instruction, it is expected to reduce the correlation between the leakage and the inside operations, and thus make the statistic analysis infeasible. The simulation shows the method is efficiency.
5

SUGIO, N., H. AONO, S. HONGO, and T. KANEKO. "A Study on Higher Order Differential Attack of KASUMI." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, no. 1 (January 1, 2007): 14–21. http://dx.doi.org/10.1093/ietfec/e90-a.1.14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Cayrol, Claudette, and Marie-Christine Lagasquie-Schiex. "Logical Encoding of Argumentation Frameworks with Higher-order Attacks and Evidential Supports." International Journal on Artificial Intelligence Tools 29, no. 03n04 (June 2020): 2060003. http://dx.doi.org/10.1142/s0218213020600039.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
We propose a logical encoding of argumentation frameworks with higher-order interactions (i.e. attacks/supports whose targets are arguments or other attacks/supports) with an evidential meaning for supports. Our purpose is to separate the logical expression of the meaning of an attack or an evidential support (simple or higher-order) from the logical expression of acceptability semantics. We consider semantics which specify the conditions under which the arguments (resp. the attacks/supports) are considered as accepted, directly on the extended framework, without translating the original framework into a Dung’s argumentation framework. We characterize the output of a given framework in logical terms (namely as particular models of a logical theory). Our proposal applies to the particular case of Dung’s frameworks, enabling to recover standard extensions.
7

Zhao, Pu, Pin-yu Chen, Siyue Wang, and Xue Lin. "Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (April 3, 2020): 6909–16. http://dx.doi.org/10.1609/aaai.v34i04.6173.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Despite the great achievements of the modern deep neural networks (DNNs), the vulnerability/robustness of state-of-the-art DNNs raises security concerns in many application domains requiring high reliability. Various adversarial attacks are proposed to sabotage the learning performance of DNN models. Among those, the black-box adversarial attack methods have received special attentions owing to their practicality and simplicity. Black-box attacks usually prefer less queries in order to maintain stealthy and low costs. However, most of the current black-box attack methods adopt the first-order gradient descent method, which may come with certain deficiencies such as relatively slow convergence and high sensitivity to hyper-parameter settings. In this paper, we propose a zeroth-order natural gradient descent (ZO-NGD) method to design the adversarial attacks, which incorporates the zeroth-order gradient estimation technique catering to the black-box attack scenario and the second-order natural gradient descent to achieve higher query efficiency. The empirical evaluations on image classification datasets demonstrate that ZO-NGD can obtain significantly lower model query complexities compared with state-of-the-art attack methods.
8

Chancellor, Dinah. "Higher-Order Thinking: A “Basic” Skill For Everyone." Arithmetic Teacher 38, no. 6 (February 1991): 48–50. http://dx.doi.org/10.5951/at.38.6.0048.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As I was walking down the hallway in one our our elementary schools the other day, one of the teachers rushed out of her room to catch me. “I love teaching this way!” she said with shining eyes. “The activities are exciting and challenging. The kids can't wait to do them. They are learning so much! I have really seen changes in how they attack problems. The only thing that bothers me is that I feel that all my students—not just the ones who have been identified as gifted— could benefit from these activities.
9

Kaedi, S., M. Doostari, and M. B. Ghaznavi-Ghoushchi. "NEMR: A Nonequidistant DPA Attack-Proof of Modular Reduction in a CRT Implementation of RSA." Journal of Circuits, Systems and Computers 27, no. 12 (June 22, 2018): 1850191. http://dx.doi.org/10.1142/s0218126618501918.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
One of the most common algorithms in a digital signature is the RSA-CRT. Several side channel attacks have been presented on the RSA-CRT’s embedded design. Such attacks are divided into two categories: attack in the modular reduction step and attack in the recombination step. The former are plaintext attacks and based on the modular reduction on equidistant data attack, which is introduced in [B. den Boer, et al., “A DPA attack against the modular reduction within a CRT implementation of RSA,” in CHES 2002]. In these attacks, instead of using random plaintext, an equidistant series of input data is used. In a chosen and equidistant plaintext attack, the attacker needs a higher level of accessibility, and it is more difficult than a nonchosen plaintext attack. In this paper, we present a nonequidistant plaintext (but chosen plaintext) differential power analysis attack on the modular reduction in RSA-CRT, named NEMR (nonequidistant plaintext on modular reduction). We also present a new countermeasure on NEMR attack, which is resistant against equidistant and nonequidistant data attack on reduction step in RSA-CRT. In order to prove the idea, the NEMR attack is applied on the RSA-CRT 2048-bit implementation on SAKURA-G board, and the result is evaluated. Then, the presented countermeasure on NEMR attack is tested, and practical results demonstrate the validity of the proposed approach.
10

Narote, Prof Amit, Vamika Zutshi, Aditi Potdar, and Radhika Vichare. "D-Dos Attack Prediction Using Machine Learning Algorithms." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 2303–12. http://dx.doi.org/10.22214/ijraset.2022.41131.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract: The risk of cyber-attack keeps on growing irrespective of development of new technologies for protection. One of the most frequent cyber-attacks is the DOS attack. A Denial-of-Service (DoS) attack is an attack which tries to shut down a machine or network, by flooding the target with unwanted traffic or triggers a crash by sending it some information, which makes it challenging for the users to access their network. A higher version of DoS attacks is the DDoS attacks that have recently become quite severe in security companies. Many organizations have begun facing these issues. Such attacks are very well coordinated that disrupts the normal functioning of the networking system from large firms to small scale business. Hence, detecting such attacks has become a tedious task. However, such a classification problem can be resolved using machine learning. Also, the same problem can be addressed using the concepts of cloud computing in order to detect and identify the computational effort carried out by the attacks. A DoS is generally considered to be an organized attack by hackers that is implemented from a single source of origin and targeted towards the victim’s end. In order to attack these systems such attackers impersonate themselves as legit users and gain access from the users by asking them their personal credential and details. As compared to this, a DDoS attack is limited to a single source of origin and takes place on distributed computers all together. Hence the primary aim of this thesis is to identify such attacks caused by hackers and detect them using machine learning algorithms. Keywords: Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Machine Learning, Bots, Botnets, flooding attacks

Дисертації з теми "Higher-order attack":

1

Ouladj, Maamar. "Optimisations des attaques par canaux cachés." Electronic Thesis or Diss., Paris 8, 2020. http://www.theses.fr/2020PA080019.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
L’ère numérique d’aujourd’hui relie tous les objets entre eux grâce à l’Internet des objets (IoT). Cela conduit à une omniprésence des systèmes embarqués, qui sont dotés de protocoles cryptographiques. Néanmoins, les implémentations de ces protocoles, entraînent des fuites d’informations sensibles pendant leur exécution. Les attaques par canaux auxiliaires (SCA) est un domaine dont l’objectif est l’analyse de ces fuites d’informations, afin de récupérer les paramètres secrets des protocoles.En fonction des habilités de l’adversaire, l’attaque optimale est soit l’analyse par corrélation de la consommation (CPA), Analyse par information mutuelle (MIA), Analyse par Régression Linéaire (LRA) ou les attaques Template (TA). Une première contribution de cette thèse est l’introduction d’une nouvelle stratégie pour améliorer le taux de succès de la CPA à messages choisis.Au lieu de mener une SCA directement sur les traces brutes, on peut la mener en utilisant les traces regroupées par la valeur du message et moyennées. En utilisant cette approche dite par coalescence, on peut réduire considérablement la complexité des SCA. Cela est asymptotiquement sans perte d’efficacité.En utilisant la Transformée de Walsh-Hadamard, on peut accélérer la CPA d’une complexité quadratique à une complexité quasi-linéaire, sous certaines conditions. Dans cette thèse, nous généralisons d’abord l’utilisation de cette approche spectrale dans la CPA. Par la suite, en utilisant à la fois le principe de coalescence, l’approche spectrale et d’autres optimisations, nous fournissons plusieurs améliorations de la complexité d’implémentation des attaques CPA, LRA et TA
Today’s digital era connects everything in between through the Internet of Things (IoT). That leads to an omnipresence of embedded systems endowed with cryptographic protocols. Nevertheless, cryptographic protocol implementations leak sensitive information during their execution. The field of Side-channel attacks (SCA) aims to analyze this leaked information, in order to recover the secret parameters of the protocols.As stated in the SCA literature, according to the adversary abilities (knowing or not the leakage model of the device, having or not a copy of this target device . . . ) the optimal attack is either the Correlation Power Analysis (CPA), Mutual Information Analysis (MIA), Linear regression Analysis (LRA) or the Template attacks (TA). A first contribution of this thesis is the introduction of a new chosen message strategy to improve the CPA success rate.Instead of carrying out an SCA straightforwardly on the rough traces, one can carry it out using the averaged leakage per message value. Using this coalescence one can reduce significantly the SCAs’ complexities, while these attacks with and without coalescence are asymptotically equivalent (which is proven in the current thesis, for the first time).Using the Walsh-Hadamard Transform (WHT), one can speed up the correlation power analysis (CPA) from a quadratic to a quasi-linear complexity, under certain conditions. In this thesis we first generalize the use of this spectral approach for any situation. Consequently, using both of the coalescence principal, the spectral approach, and others optimizations, we provide several improvements of the implementation complexity in both of CPA, LRA and the Template attacks
2

Ocampo, Mascaró Javier, Salazar Vera Jimena Silva, and Costa Bullón Abilio da. "Correlación entre conocimientos sobre consecuencias de la obesidad y grado de actividad física en universitarios." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2015. http://hdl.handle.net/10757/621624.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Introducción. El objetivo del presente estudio es determinar si existe correlación entre los conocimientos sobre las consecuencias de la obesidad y el grado de actividad física de las personas. Métodos. Se realizó un estudio transversal analítico durante los años 2013 y 2014. Participaron 215 alumnos de pregrado seleccionados por conveniencia no relacionados a carreras del campo de la salud en una universidad de Lima, Perú. Se evaluó el grado de actividad física utilizando el International Physical Activity Questionnaire (IPAQ) y el nivel de conocimientos sobre consecuencias de la obesidad utilizando la escala Obesity Risk Knowledge-10 (ORK-10). También, se consignó las fuentes de información de donde obtuvieron el conocimiento para responder dicho cuestionario. Resultados. La mediana de edad fue 20 (rango intercuartílico=4) y 63% eran mujeres. De acuerdo al IPAQ, 53,9% realizaban actividad física alta, 35,4%, moderada y 10,7%, leve. Se encontró una correlación muy baja (rs=0,06) entre el puntaje del ORK-10 y la cantidad de equivalentes metabólicos/minuto consumidos por semana, pero no era significativa (p=0,38). Las personas informadas por medios de comunicación y por personal de salud obtuvieron mayores puntajes en el ORK- 10 que quienes se informaron por otras vías (p<0,05). Conclusiones. La correlación entre los conocimientos sobre consecuencias de la obesidad y el grado de actividad física es muy baja. Es necesario utilizar enfoques multidisciplinarios que incluyan todos los determinantes de la realización de actividad física para poder lograr cambios en la conducta de la población.
3

Deptová, Lucie. "Vztah útoků odvozených od vyšších stupňů a CCZ ekvivalence." Master's thesis, 2016. http://www.nusl.cz/ntk/nusl-352686.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
In this thesis, we explain the term CCZ-equivalence in more detail to- gether with an analysis of a special type of matrices of this equivalence. We also clarify the higher order differential cryptanalysis and its generalized ver- sion. To demonstrate this method we present several attacks on a simple five round Feistel cipher, two of these attacks are our own. We have implemented the most important attacks and results of these experiments can be found in the text. We also explore how to use a decomposition F = F2 ◦F−1 1 (where F1 and F2 are permutations) to construct a generalized higher order differential attack to a block cipher with an S-box F. This construction may be used while searching for an attack to F using the CCZ-equivalence which is gener- ally a hard question. The result of our research is a theorem which presents a necessary condition on a degree of F which is needed for an existence of such a decomposition. 1

Книги з теми "Higher-order attack":

1

Latour, Melinda. Santana and the Metaphysics of Tone. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780199985227.003.0010.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Throughout his career, Carlos Santana has used music to express his idiosyncratic spiritual beliefs. Pursuing the guidance of guru Sri Chinmoy in the 1970s and subsequently seeking his own spiritual path, Santana sought to channel a higher power through his guitar technique and tone, describing the process of music making as a mystical endeavor. In order to attain these goals, Santana used amplifiers that prioritized depth of sound (described by himself in synesthetic terms), feedback loops for his signature sustained tones, an avoidance of hypermasculine performance, and a peaceful stage presence. This chapter investigates the role of timbre in Santana’s spiritual journey from the 1960s to the present.
2

Craig, Paul, and Gráinne de Búrca. 4. Instruments and the Hierarchy of Norms. Oxford University Press, 2015. http://dx.doi.org/10.1093/he/9780198714927.003.0004.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
All books in this flagship series contain carefully selected substantial extracts from key cases, legislation, and academic debate, providing able students with a stand-alone resource. This chapter examines two related issues: the EU’s legal and non-legal instruments; and the hierarchy of norms. The EU has a number of legal and non-legal instruments that are used to attain Union objectives. The principal legal instruments are regulations, directives, and decisions. The hierarchy of norms refers to the idea that in a legal system there will be a vertical ordering of legal acts, with those in the lower rungs of the hierarchy being subject to legal acts of a higher status. There are currently five principal tiers to the hierarchy of norms in EU law, which are, in descending order: the constituent Treaties and Charter of Rights; general principles of law; legislative acts; delegated acts; and implementing acts. The chapter discusses the meaning of these different tiers.
3

Elliott III, William, and Melinda K. Lewis. Student Debt. ABC-CLIO, LLC, 2017. http://dx.doi.org/10.5040/9798216020462.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Offering answers to essential questions about student debt and many connected issues, this book examines student debt in the United States at every stage of the process—from the banks that issue the loans to the colleges and universities that collect the payments. Student lending in the United States is one of the most controversial issues in contemporary American discourse. Are these loans the only option for Americans who want to attend college and university in order to attain the best careers and have a productive, enjoyable life? Should the predatory lending practices of for-profit colleges and universities be stopped? How can limits be imposed on student lending amounts without preventing students from getting the education they need to succeed? The book explains why so many students are borrowing large amounts of money to attend college; considers whether the cost of higher education is simply too high, and if there should be a cap on how much money students can borrow; explains what is contributing to the rising rate of borrowers defaulting on their loans; and predicts whether the so-called student loan bubble is in danger of popping. The Data and Documents chapter analyzes data gathered from discussions about student debt. This information enables readers to better understand who is borrowing student loans, what the money from the student loans is going toward, what individuals have the authority to decide who qualifies for these loans, and what is being done to curb wasteful student spending.
4

Dickinson, Kay, Alisa Perren, Michael Curtin, Marwan M. Kraidy, Michael Keane, Darrell Davis, Anne Jäckel, et al. Supply Chain Cinema. Bloomsbury Publishing Plc, 2024. http://dx.doi.org/10.5040/9781839024658.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Why are big budget films typically made across an array of seemingly dissociated sites? Supply Chain Cinema shows how the production journeys of such films exemplify the principles of the supply chain, whose core imperative is to nimbly and opportunistically manufacturing wherever is most amenable and efficient. Through extensive on-site investigations and in-depth interviews with film professionals, Kay Dickinson delivers nuanced insight into working practices in the UK and the UAE. Among the sites she examines is Warner Bros’ permanent base at Leavesden Studios near London. From tax breaks designed to attract foreign projects to infrastructures, logistical support and expertise offered, she considers why Hollywood giants elect to make more of their films in Britain than in the USA. Dickinson goes on to show how the UK’s ambitions to enlarge its creative economies has opened up a host of competitive advantages with British higher education increasingly fashioned to conform to the needs of border-hopping enterprise, thus generating a workforce keenly adapted to the demands of blockbuster moviemaking. This book proposes that the ways in which big-budget films are made across an array of seemingly dissociated sites exemplify the principles of supply chain production. Chapter 1 examines how supply chain cinema routes through wherever is most amenable and economical in order to take advantage of government support, tax incentives, customized infrastructures, logistical efficiencies, transnational standardization and coordination in tandem with sectional, fragmented and project-by-project reconfigurations of precarious labour. Chapter 2 investigates why Hollywood giants elect to make more of their films in Britain than in the USA, availing themselves of the UK’s ambitions to enlarge its creative economies, which have rendered the workforce all the more keenly adapted to the structures and demands of blockbuster moviemaking. Chapter 3 explores how the film industry, in concert with the UK government, has massaged filmmaking education to fit its needs. Chapter 4 assesses how the United Arab Emirates (UAE) has geared up its creative economy policy and education systems, largely through English-medium foreign franchise universities, to train a supply chain-ready workforce. Chapter 5 asks: what does the UAE furnish these incoming projects and at what cost to a precarious and largely migrant workforce? The Conclusion (like the end of each chapter) offers suggestions for how the injustices that the supply chain cinema exploits and expands might be challenged, diminished and eradicated.

Частини книг з теми "Higher-order attack":

1

Moriai, Shiho, Takeshi Shimoyama, and Toshinobu Kaneko. "Higher Order Differential Attack Using Chosen Higher Order Differences." In Selected Areas in Cryptography, 106–17. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-48892-8_9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Takhar, Gourav, Ramesh Karri, Christian Pilato, and Subhajit Roy. "HOLL: Program Synthesis for Higher Order Logic Locking." In Tools and Algorithms for the Construction and Analysis of Systems, 3–24. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99524-9_1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractLogic locking “hides” the functionality of a digital circuit to protect it from counterfeiting, piracy, and malicious design modifications. The original design is transformed into a “locked” design such that the circuit reveals its correct functionality only when it is “unlocked” with a secret sequence of bits—the key bit-string. However, strong attacks, especially the SAT attack that uses a SAT solver to recover the key bit-string, have been profoundly effective at breaking the locked circuit and recovering the circuit functionality.We lift logic locking to Higher Order Logic Locking (HOLL) by hiding a higher-order relation, instead of a key of independent values, challenging the attacker to discover this key relation to recreate the circuit functionality. Our technique uses program synthesis to construct the locked design and synthesize a corresponding key relation. HOLL has low overhead and existing attacks for logic locking do not apply as the entity to be recovered is no more a value. To evaluate our proposal, we propose a new attack (SynthAttack) that uses an inductive synthesis algorithm guided by an operational circuit as an input-output oracle to recover the hidden functionality. SynthAttack is inspired by the SAT attack, and similar to the SAT attack, it is verifiably correct, i.e., if the correct functionality is revealed, a verification check guarantees the same. Our empirical analysis shows that SynthAttack can break HOLL for small circuits and small key relations, but it is ineffective for real-life designs.
3

Iwata, Tetsu, and Kaoru Kurosawa. "Probabilistic Higher Order Differential Attack and Higher Order Bent Functions." In Advances in Cryptology - ASIACRYPT’99, 62–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-540-48000-6_7.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Hatano, Yasuo, Hiroki Sekine, and Toshinobu Kaneko. "Higher Order Differential Attack of Camellia(II)." In Selected Areas in Cryptography, 129–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-36492-7_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Krämer, Juliane. "Higher-Order Fault Attacks Against Pairing Computations." In Why Cryptography Should Not Rely on Physical Attack Complexity, 79–101. Singapore: Springer Singapore, 2015. http://dx.doi.org/10.1007/978-981-287-787-1_5.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Moriai, Shiho, Takeshi Shimoyama, and Toshinobu Kaneko. "Higher Order Differential Attack of a CAST Cipher." In Fast Software Encryption, 17–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-69710-1_2.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Hatano, Yasuo, Hidema Tanaka, and Toshinobu Kaneko. "An Optimized Algebraic Method for Higher Order Differential Attack." In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 61–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44828-4_8.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

AlTawy, Riham, Mohamed Tolba, and Amr M. Youssef. "A Higher Order Key Partitioning Attack with Application to LBlock." In Lecture Notes in Computer Science, 215–27. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18681-8_17.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Watanabe, Dai, Yasuo Hatano, Tsuyoshi Yamada, and Toshinobu Kaneko. "Higher Order Differential Attack on Step-Reduced Variants of Luffa v1." In Fast Software Encryption, 270–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-13858-4_15.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Tanaka, Hidema, Kazuyuki Hisamatsu, and Toshinobu Kaneko. "Strength of ISTY1 without FL Function for Higher Order Differential Attack." In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 221–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/3-540-46796-3_22.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Higher-order attack":

1

Lerman, Liran, Nikita Veshchikov, Stjepan Picek, and Olivier Markowitch. "Higher order side-channel attack resilient S-boxes." In CF '18: Computing Frontiers Conference. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3203217.3206428.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Nateghi, Shamila, Yuri Shtessel, R. J. Rajesh, and Siddharth Sankar Das. "Control of Nonlinear Cyber-Physical Systems under Attack Using Higher Order Sliding Mode Observer." In 2020 IEEE Conference on Control Technology and Applications (CCTA). IEEE, 2020. http://dx.doi.org/10.1109/ccta41146.2020.9206251.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Koga, Hiroki, and Kaoru Itabashi. "A Higher Order Analysis of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack." In IH&MMSec '16: ACM Information Hiding and Multimedia Security Workshop. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2909827.2930788.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Nateghi, Shamila, Yuri Shtessel, Jean-Pierre Barbot, and Christopher Edwards. "Cyber Attack Reconstruction of Nonlinear Systems via Higher-Order Sliding-Mode Observer and Sparse Recovery Algorithm." In 2018 IEEE Conference on Decision and Control (CDC). IEEE, 2018. http://dx.doi.org/10.1109/cdc.2018.8619354.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

De Souza, Gustavo Botelho, João Paulo Papa, and Aparecido Nilceu Marana. "Efficient Deep Learning Architectures for Face Presentation Attack Detection." In Conference on Graphics, Patterns and Images. Sociedade Brasileira de Computação, 2020. http://dx.doi.org/10.5753/sibgrapi.est.2020.12992.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Biometric systems are common in our everyday life: from our mobile devices to huge surveillance systems. Despite the higher difficulty to circumvent biometric applications, criminals are simulating traits such as face or fingerprints of valid users (presentation attacks - PA), in order to fool the security applications. Deep neural networks have obtained state-of-theart results in PA detection. However, in many cases, they are computationally expensive, being not feasible in environments with hardware restrictions, such as mobile ones. In this sense, we propose efficient deep learning architectures for PA detection, especially for face recognition systems, able to be trained and deployed even when there is low computational power available.
6

Herzig, Andreas, and Antonio Yuste Ginel. "Multi-Agent Abstract Argumentation Frameworks With Incomplete Knowledge of Attacks." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/265.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
We introduce a multi-agent, dynamic extension of abstract argumentation frameworks (AFs), strongly inspired by epistemic logic, where agents have only partial information about the conflicts between arguments. These frameworks can be used to model a variety of situations. For instance, those in which agents have bounded logical resources and therefore fail to spot some of the actual attacks, or those where some arguments are not explicitly and fully stated (enthymematic argumentation). Moreover, we include second-order knowledge and common knowledge of the attack relation in our structures (where the latter accounts for the state of the debate), so as to reason about different kinds of persuasion and about strategic features. This version of multi-agent AFs, as well as their updates with public announcements of attacks (more concretely, the effects of these updates on the acceptability of an argument) can be described using S5-PAL, a well-known dynamic-epistemic logic. We also discuss how to extend our proposal to capture arbitrary higher-order attitudes and uncertainty.
7

Alibeigi, Sepideh. "Wind Tunnel Investigation of the Flow Field on Slender Sharp-Edged Half Delta Wings." In ASME 2010 International Mechanical Engineering Congress and Exposition. ASMEDC, 2010. http://dx.doi.org/10.1115/imece2010-37014.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
An experimental study was conducted in order to investigate the flow field over half delta wings. These wind tunnel tests was carried out over the 70 degree swept half delta wing at angles of attack of 10 to 35 degrees between 1.5×105 and 2.5×105 Reynolds Numbers. Therefore, the effect of angle of attack’s variation and Reynolds Number’s variation was perused. The pressure contour at different cross section of the delta wing was obtained by using pitot tubes. Furthermore, by using a hot wire anemometer the turbulence intensity, average velocity, and mean kinetic energy was measured. The results show that as the angle of attack increases, the vortex core become bigger and stronger. Not only does the vortex core become bigger, but also it moves toward inside of the delta wing. The magnitude of pressure coefficient at the center of vortex is lower than the other regions. By increasing of the angle of attack the pressure coefficient at the vortex core declines more. Moreover, the results indicate that the vortex location and its breakdown are not changing with variation of Reynolds number between 1.5 and 2.5×105. In addition, the turbulence intensity, average velocity, and mean kinetic energy, obtained by the hot wire, at the vortex core are higher than the other regions.
8

Liu, Junyi, Dawei Cheng, and Changjun Jiang. "Preventing Attacks in Interbank Credit Rating with Selective-aware Graph Neural Network." In Thirty-Second International Joint Conference on Artificial Intelligence {IJCAI-23}. California: International Joint Conferences on Artificial Intelligence Organization, 2023. http://dx.doi.org/10.24963/ijcai.2023/675.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Accurately credit rating on Interbank assets is essential for a healthy financial environment and substantial economic development. But individual participants tend to provide manipulated information in order to attack the rating model to produce a higher score, which may conduct serious adverse effects on the economic system, such as the 2008 global financial crisis. To this end, in this paper, we propose a novel selective-aware graph neural network model (SA-GNN) for defense the Interbank credit rating attacks. In particular, we first simulate the rating information manipulating process by structural and feature poisoning attacks. Then we build a selective-aware defense graph neural model to adaptively prioritize the poisoning training data with Bernoulli distribution similarities. Finally, we optimize the model with weighed penalization on the objection function so that the model could differentiate the attackers. Extensive experiments on our collected real-world Interbank dataset, with over 20 thousand banks and their relations, demonstrate the superior performance of our proposed method in preventing credit rating attacks compared with the state-of-the-art baselines.
9

Pint, Bruce A., and Raphae¨lle Peraldi. "Factors Affecting Corrosion Resistance of Recuperator Alloys." In ASME Turbo Expo 2003, collocated with the 2003 International Joint Power Generation Conference. ASMEDC, 2003. http://dx.doi.org/10.1115/gt2003-38692.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As microturbine recuperators are needed to operate at higher temperatures in order to achieve higher engine operating efficiencies, a recurring problem encountered is a severe degradation in environmental resistance of type 347 stainless steel. Above 600°C, stainless steels can experience accelerated attack caused by water vapor, which is often present as a combustion product. Nickel-base alloys are less susceptible to this accelerated attack but their cost is prohibitive. In order to provide a clear, fundamental understanding of alloy composition effects on corrosion resistance of stainless steel components used in recuperators, the oxidation behavior of model alloys is being studied. A composition range of Cr and Ni contents has been identified with better corrosion resistance than type 347 stainless steel. Finer-grained alloys showed improved corrosion resistance compared to coarse-grained alloys with the same composition. It also has been demonstrated that minor alloy additions of Mn and Si are beneficial to corrosion resistance in these environments. This type of information will aid in the development of a corrosion-resistant and cost-effective recuperator material for operation at 650°–700°C.
10

Gordnier, Raymond E., and Peter J. Attar. "Impact of Flexibility on the Aerodynamics of an Aspect Ratio Two Membrane Wing." In ASME 2012 Fluids Engineering Division Summer Meeting collocated with the ASME 2012 Heat Transfer Summer Conference and the ASME 2012 10th International Conference on Nanochannels, Microchannels, and Minichannels. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/fedsm2012-72296.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Development of an aeroelastic solver with application to flexible membrane wings for micro air vehicles is presented. A high-order (up to 6th order) Navier-Stokes solver is coupled with a geometrically nonlinear p-version Reissner-Mindlin finite element plate model to simulate the highly flexible elastic membrane. An implicit LES approach is employed to compute the mixed laminar/transitional/turbulent flowfields present for the low Reynolds number flows associated with micro air vehicles. Computations are performed for an aspect ratio two membrane wing at angles of attack α = 10°, 16° and 23° for a Reynolds number, Re = 24,300. Comparisons of the computational results with experimental PIV and surface deflection measurements demonstrated reasonable agreement. Reduced separation and enhanced lift are obtained due to favorable interactions between the flexible membrane wing and the unsteady flow over the wing. The impact of flexibility on the aerodynamic performance comes primarily from the development of mean camber with some further effects arising from the interaction between the dynamic motion of the membrane and the unsteady flowfield above. At lower angles of attack this lift enhancement comes at the cost of reduced L/D. The nose-down pitching moment increases with flexibility at the lowest angle of attack but is reduced for the higher two angles of attack. These results suggest that membrane flexibility might provide a means to reduce the impact of strong gust encounter by maintaining lift and reducing the effect of the gust on pitching moment.

Звіти організацій з теми "Higher-order attack":

1

Avi-Yonah, Reuven S. Globalization and Tax Competition: Implications for Developing Countries. Inter-American Development Bank, February 2001. http://dx.doi.org/10.18235/0008545.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The current age of globalization can be distinguished from the previous one by the much higher mobility of capital than labor. The mobility of capital has led to tax competition, in which sovereign countries lower their tax rates on income earned by foreigners within their borders in order to attract both portfolio and direct investment. Tax competition, in turn, threatens to undermine the individual and corporate income taxes, which remain major sources of revenue for all modern states. This paper argues that if government service programs are to be maintained in the face of globalization, it is necessary to cut the intermediate link by limiting tax competition.
2

Shpigel, Muki, Allen Place, William Koven, Oded (Odi) Zmora, Sheenan Harpaz, and Mordechai Harel. Development of Sodium Alginate Encapsulation of Diatom Concentrates as a Nutrient Delivery System to Enhance Growth and Survival of Post-Larvae Abalone. United States Department of Agriculture, September 2001. http://dx.doi.org/10.32747/2001.7586480.bard.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The major bottlenecks in rearing the highly priced gastropod abalone (Haliotis spp.) are the slow growth rate and the high mortality during the first 8 to 12 weeks following metamorphosis and settling. The most likely reason flor these problems is related to nutritional deficiencies in the diatom diet on which the post larvae (PL) feed almost exclusively in captivity. Higher survival and improved growth rate will reduce the considerable expense of hatchery-nursery resisdence time and thereflore the production costs. BARD supported our research for one year only and the support was given to us in order to prove that "(1) Abalone PL feed on encapsulated diatoms, and (2) heterotrophic diatoms can be mass produced." In the course of this year we have developed a novel nutrient delivery system specifically designed to enhance growth and survival of post-larval abalone. This approach is based on the sodium-alginate encapsulation of heterotrophically grown diatoms or diatom extracts, including appetite-stimulating factors. Diatom species that attract the PL and promote the highest growth and survival have been identified. These were also tested by incorporating them (either intact cells or as cell extracts) into a sodium-alginate matrix while comparing the growth to that achieved when using diatoms (singel sp. or as a mixture). A number of potential chemoattractants to act as appetite-stimulating factors for abalone PL have been tested. Preliminary results show that the incorporation of the amino acid methionine at a level of 10-3M to the sodim alginate matrix leads to a marked enhancement of growth. The results ol these studies provided basic knowledge on the growth of abalone and showed that it is possible to obtain, on a regular basis, survival rates exceeding 10% for this stage. Prior to this study the survival rates ranged between 2-4%, less than half of the values achieved today. Several diatom species originated from the National Center for Mariculture (Nitzchia laevis, Navicula lenzi, Amphora T3, and Navicula tennerima) and Cylindrotheca fusiformis (2083, 2084, 2085, 2086 and 2087 UTEX strains, Austin TX) were tested for heterotrophic growth. Axenic colonies were initially obtained and following intensive selection cycles and mutagenesis treatments, Amphora T3, Navicula tennerima and Cylindrotheca fusiformis (2083 UTEX strain) were capable of growing under heterotrophic conditions and to sustain highly enriched mediums. A highly efficient selection procedure as well as cost effective matrix of media components were developed and optimized. Glucose was identified as the best carbon source for all diatom strains. Doubling times ranging from 20-40 h were observed, and stable heterotroph cultures at a densities range of 103-104 were achieved. Although current growth rates are not yet sufficient for full economical fermentation, we estimate that further selections and mutagenesis treatments cycles should result in much faster growing colonies suitable for a fermentor scale-up. As rightfully pointed out by one of the reviewers, "There would be no point in assessing the optimum levels of dietary inclusions into micro-capsules, if the post-larvae cannot be induced to consume those capsules in the first place." We believe that the results of the first year of research provide a foundationfor the continuation of this research following the objectives put forth in the original proposal. Future work should concentrate on the optimization of incorporation of intact cells and cell extracts of the developed heterotrophic strains in the alginate matrix, as well as improving this delivery system by including liposomes and chemoattractants to ensure food consumption and enhanced growth.

До бібліографії