Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Lingyue Qin"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 4 (2023)
Fault analysis is a powerful technique to retrieve secret keys by exploiting side-channel information. Differential fault analysis (DFA) is one of the most powerful threats utilizing differential information between correct and faulty ciphertexts and
Externí odkaz:
https://doaj.org/article/8ca64e5d16bf47a2b6aed8cc578e3f67
Publikováno v:
Symmetry, Vol 15, Iss 6, p 1196 (2023)
Differential fault analysis (DFA) was introduced by Biham and Shamir. It is a powerful analysis technique to retrieve the secret key by injecting fault into an internal state and utilizing the differences between the correct ciphertexts and the fault
Externí odkaz:
https://doaj.org/article/16442c98a9dc429b80c415dcbe26cdf3
Autor:
Qianliang Ming, Xiuning Huang, Yimo He, Lingyue Qin, Yu Tang, Yanxia Liu, Yuting Huang, Hongwei Zhang, Peng Li
Publikováno v:
Microorganisms, Vol 11, Iss 4, p 968 (2023)
Endophytic fungi are a treasure trove of natural products with great chemical diversity that is largely unexploited. As an alternative to the traditional bioactivity-guided screening approach, the genome-mining-based approach provides a new methodolo
Externí odkaz:
https://doaj.org/article/98193079efb247bc9cae8b05cf4d76e5
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2021, Iss 2 (2021)
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today. In those models, the optimizing objective is usually the pr
Externí odkaz:
https://doaj.org/article/1ced57ee50d248f2bf37bcabd9f7dbf6
Publikováno v:
Symmetry; Volume 15; Issue 6; Pages: 1196
Differential fault analysis (DFA) was introduced by Biham and Shamir. It is a powerful analysis technique to retrieve the secret key by injecting fault into an internal state and utilizing the differences between the correct ciphertexts and the fault
Publikováno v:
The Computer Journal. 66:970-986
At CRYPTO 2021, Dong et al. proposed an automatic method of Meet-in-the-Middle (MITM) key-recovery attacks. In this paper, we further extend it to a new automatic model which can be used to find low-data complexity attacks. With the help of the autom
Publikováno v:
Advances in Cryptology – EUROCRYPT 2023 ISBN: 9783031306334
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::559c124ce1f83fd22f06cbaccb9d1d62
https://doi.org/10.1007/978-3-031-30634-1_6
https://doi.org/10.1007/978-3-031-30634-1_6
Publikováno v:
The Computer Journal.
At FSE 2008, Leurent introduced the preimage attack on MD4 by exploiting differential trails. In this paper, we apply the differential-aided preimage attack to Keccak with the message modification techniques. Instead of directly finding the preimage,
Publikováno v:
Mathematical Problems in Engineering, Vol 2021 (2021)
Rejection sampling technology is a core tool in the design of lattice-based signatures with ‘Fiat–Shamir with Aborts’ structure, and it is related to signing efficiency and signature, size as well as security. In the rejection sampling theorem
Autor:
Qianliang Ming, Xiuning Huang, Linming Guo, Dong Liu, Lingyue Qin, Yimo He, Yu Tang, Yanxia Liu, Junkang Liu, Peng Li
Publikováno v:
Folia microbiologica. 67(6)
This study aimed at investigating the diversity of endophytic fungi from Coptis chinensis and their activity against methicillin-resistant Staphylococcus aureus (MRSA). Seventy-nine fungal isolates obtained from C. chinensis were identified to belong