搜索结果: 1-15 共查到“知识库 recovery”相关记录532条 . 查询时间(0.171 秒)
Evaluating Post-Fire Vegetation Recovery in Cajander Larch Forests in Northeastern Siberia Using UAV Derived Vegetation Indices
Larix cajanderi Siberia wildfire drones uncrewed aerial vehicle NDVI GCC normalized difference vegetation index green chromatic coordinate
font style='font-size:12px;'>
2023/12/18
The ability to monitor post-fire ecological responses and associated vegetation cover change is crucial to understanding how boreal forests respond to wildfire under changing climate conditions. Uncre...
Molecular and Physiological Responses of Naturally Grown Atriplex halimus L. to Drought-Stress Recovery in the Absence or Presence of Na+ Ions Under Natural Conditions
Atriplex halimus Stress/recovery-inducible genes NaCl Photosynthesis Recovery
font style='font-size:12px;'>
2023/12/4
It was suggested that Na+ ions could play a vital role in the growth of xero-halophyte Atriplex halimus. This study aims at investigating the impact of Na+ ions on the response of droughted A. halimus...
Superstructure-Based Simultaneous Optimization of a Heat Exchanger Network and a Compression-Absorption Cascade Refrigeration System for Heat Recovery
Heat Exchanger Network Refrigeration System Heat Recovery
font style='font-size:12px;'>
2023/6/19
A heat exchanger network (HEN) plays an important role in the chemical process industry owing to its significant effect in energy recovery. A compression-absorption cascade refrigeration system (CACRS...
Key recovery attacks on the Legendre PRFs within the birthday bound
PRF Legendre tradeoff
font style='font-size:12px;'>
2019/7/26
We show that Legendre PRF, recently suggested as an MPC-friendly primitive in a prime field ZpZp, admits key recovery attacks of complexity O(p√)O(p) rather than previously assumed O(p)O(p). We also d...
Plaintext Recovery Attacks against XTS Beyond Collisions
XTS Storage encryption Mode of operation
font style='font-size:12px;'>
2019/7/17
XTS is an encryption scheme for storage devices standardized by IEEE and NIST. It is based on Rogaway's XEX tweakable block cipher and is known to be secure up to the collisions between the blocks, th...
Forward Integrity and Crash Recovery for Secure Logs
cryptographic protocols computer systems
font style='font-size:12px;'>
2019/5/21
Logging is a key mechanism in the security of computer systems. Beyond supporting important forward security properties, it is critical that logging withstands both failures and intentional tampering ...
Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak
Conditional Cube Attack Keccak Ketje Jr
font style='font-size:12px;'>
2019/5/9
Conditional cube attack was proposed by Huang et al. at EUROCRYPT 2017 to attack Keccak keyed mode. Inspired by dynamic cube attack, they reduce the degree by appending key bit conditions on the initi...
Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
Division property cube attacks MILP Trivium
font style='font-size:12px;'>
2019/4/16
Cube attacks are an important type of key recovery attacks against stream ciphers. In particular, it is shown to be powerful against Trivium-like ciphers. Traditional cube attacks are experimental att...
Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery
Side-Channel Attacks Deep Learning Machine Learning
font style='font-size:12px;'>
2019/2/26
Deep Neural Networks (DNNs) have recently received significant attention in the side-channel community due to their state-of-the-art performance in security testing of embedded systems. However, resea...
Non-profiled Mask Recovery: the impact of Independent Component Analysis
Side Channel Analysis Masking Independent Component Analysis
font style='font-size:12px;'>
2018/11/13
As one of the most prevalent SCA countermeasures, masking schemes are designed to defeat a broad range of side channel attacks. An attack vector that is suitable for low-order masking schemes is to tr...
Plaintext Recovery Attack of OCB2
OCB2 plaintext recovery attack chosen plaintext
font style='font-size:12px;'>
2018/11/12
Inoue and Minematsu [Cryptology ePrint Archive: Report 2018/1040] presented efficient forgery attacks against OCB2, and Poettering [Cryptology ePrint Archive: Report 2018/1087] presented a distinguish...
A Refinement of “A Key-recovery Attack on 855-round Trivium" From CRYPTO 2018
Trivium Nullification Technique Polynomial Reduction
font style='font-size:12px;'>
2018/11/5
At CRYPTO 2018, we proposed a method to reduce the Boolean polynomial of 855-round Trivium. By multiplying a polynomial reduction factor, the output Boolean polynomial is simplified. Based on this met...
A Key Recovery Attack on Streamlined NTRU Prime
NTRU Prime key encapsulation mechanism IND-CCA security
font style='font-size:12px;'>
2018/11/5
For years, researchers have been engaged in finding new cryptography schemes with high security and efficiency that can resist against the attacking from quantum computers. Lattice-based cryptography ...
Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage
Searchable Encryption Encrypted Databases Leakage-Abuse Attacks
font style='font-size:12px;'>
2018/8/2
Recent works by Kellaris et al. (CCS’16) and Lacharite et al. (SP’18) demonstrated attacks of data recovery for encrypted databases that support rich queries such as range queries. In this paper, we d...
Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities
AES Mixture Differential
font style='font-size:12px;'>
2018/6/5
Determining the security of AES is a central problem in cryptanalysis, but progress in this area had been slow and only a handful of cryptanalytic techniques led to significant advancements. At Eurocr...