搜索结果: 1-15 共查到“tradeoff”相关记录33条 . 查询时间(0.074 秒)
On designing secure small-state stream ciphers against time-memory-data tradeoff attacks
Stream cipher Ultra-lightweight Small-state
2019/6/10
A new generation of stream ciphers, small-state stream ciphers (SSCs), was born in 2015 with the introduction of the Sprout cipher. The new generation is based on using key bits not only in the initia...
Retrieval cues and syntactic ambiguity resolution: Speed-accuracy tradeoff evidence
Sentence processing reanalysis retrievalinterference cue-based retrieval speed-accuracytradeoff
2018/3/5
Neuroscience. Advance online publication. doi:10.1080/23273798.2018.1427877.
Language comprehension involves coping with ambiguity and recovering from misanalysis. Syntactic ambiguity resolution is a...
Distributed Time-Memory Tradeoff Attacks on Ciphers (with Application to Stream Ciphers and Counter Mode)
cryptanalysis time-memory tradeoff attacks block ciphers
2018/2/3
In this paper, we consider the implications of parallelizing time-memory tradeoff attacks using a large number of distributed processors. It is shown that Hellman’s original tradeoff method and the Bi...
Novel Bypass Attack and BDD-based Tradeoff Analysis Against all Known Logic Locking Attacks
Logic Locking SAT Attack Hardware IP Protection
2017/6/28
Logic locking has emerged as a promising technique for protecting gate-level semiconductor intellectual property. However, recent work has shown that such gate-level locking techniques are vulnerable ...
Cryptanalytic Time-Memory Tradeoff for Password Hashing Schemes
Time-Memory tradeoff password hashing
2017/6/26
A cryptanalytic technique known as time-memory tradeoff (TMTO) was proposed by Hellman for finding the secret key of a block cipher. This technique allows sharing the effort of key search between the ...
Time-Memory Tradeoff Attacks on the MTP Proof-of-Work Scheme
Proof-of-work Merkle Tree Proof
2017/6/2
Proof-of-work (PoW) schemes are cryptographic primitives with numerous applications, and in particular, they play a crucial role in maintaining consensus in cryptocurrency networks. Ideally, a cryptoc...
Time-Memory-Data Tradeoff Attacks against Small-State Stream Ciphers
Stream Ciphers Lightweight Cryptography Time-Memory-Data Tradeoff Attacks
2017/5/5
Time-memory-data (TMD) tradeoff attacks limit the security level of many classical stream ciphers (like E0E0, A5/1, Trivium, Grain) to 12n12n, where nn denotes the inner state length of the underlying...
On the Hardness of Trivium and Grain with respect to Generic Time-Memory-Data Tradeoff Attacks
Stream Ciphers Time-Memory-Data Tradeoff Attacks Security Lower Bound Proofs
2017/4/5
Time-Memory-Data tradeoff attacks (TMD-attacks) like those of Babbage, Biryukov and Shamir, and Dunkelman and Keller reduce the security level of keystream generator based-stream ciphers to L/2L/2, wh...
LIFO-Backpressure Achieves Near Optimal Utility-Delay Tradeoff
Queueing Dynamic Control LIFO scheduling Lyapunov analysis Stochastic Optimization
2016/1/23
There has been considerable work developing a stochastic network utility maximization framework using Back-pressure algorithms, also known as MaxWeight. A key open problem has been the development of ...
We explore time-memory and other tradeoffs for memory-hard functions, which are supposed
to impose significant computational and time penalties if less memory is used than intended. We
analyze three...
Practical Cryptanalysis of Full Sprout with TMD Tradeoff Attacks
LFSR NLFSR guess-and-determine
2015/12/31
The internal state size of a stream cipher is supposed to be at least twice the key length to provide resistance against the conventional Time-Memory-Data (TMD) tradeoff attacks. This well adopted sec...
Fast and Tradeoff-Resilient Memory-Hard Functions for Cryptocurrencies and Password Hashing
memory-hard cryptocurrency bitcoin tradeoff
2015/12/30
Memory-hard functions are becoming an important tool in the design of password hashing schemes, cryptocurrencies,
and more generic proof-of-work primitives that are x86-oriented and can not be comput...
Public Choices Between Life-Saving Programs: The Tradeoff Between Qualitative Factors and Lives Saved
health and safety regulations risk characteristics
2015/9/18
In a telephone survey 1000 adults were confronted with pairs of life saving programs that differed in
number of lives saved and asked which program in each pair they would choose to implement.
Respo...
The Inflation-Output Variability Tradeoff Revisited
Inflation Variability Tradeoff Revisited
2015/8/4
The Inflation-Output Variability Tradeoff Revisited.
Hick’s Law in a Stochastic Race Model with Speed–Accuracy Tradeoff
Hick’s law choice-RT race models accumulators speed– accuracy tradeoff Wiener process diffusion Shannon information
2015/6/19
We present an analytic solution for a race model of n stochastic accumulators for multiple choice reaction time. We show that to maintain a constant level of accuracy, the response criterion needs to ...