gout109 发表于 2025-3-25 04:58:36
https://doi.org/10.1007/978-3-319-05149-9anomaly detection; cryptography; denial of service attacks; intrusion detection; mobile securityMindfulness 发表于 2025-3-25 09:38:28
LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processorseral-purpose processors. Our experiments show that LEA is faster than AES on Intel, AMD, ARM, and ColdFire platforms. LEA can be also implemented to have tiny code size. Its hardware implementation has a competitive throughput per area. It is secure against all the existing attacks on block ciphers.Antarctic 发表于 2025-3-25 12:03:54
Some New Weaknesses in the RC4 Stream Cipheroretical proof of this bias. This bias immediately provide distinguisher for RC4, and ciphertext only attack on broadcast RC4. Additionally, we discover some new weaknesses of the keystream bytes even after the first . rounds of the PRGA, where . is the size of the RC4 permutation, generally, .. The皱痕 发表于 2025-3-25 16:22:03
http://reply.papertrans.cn/47/4653/465282/465282_24.pnghabitat 发表于 2025-3-25 21:54:08
A General Method to Evaluate the Correlation of Randomness Tests tests. Firstly, we deduce the distribution that independent randomness tests should obey, then evaluate whether the randomness tests are independent or not based on hypothesis test. Using this method, we research the correlation of some statistical tests included in the NIST SP 800-22 suits, whichcraving 发表于 2025-3-26 00:25:45
http://reply.papertrans.cn/47/4653/465282/465282_26.png删减 发表于 2025-3-26 04:40:35
Dynamic Surveillance: A Case Study with Enron Email Data Setgn stronger anonymity algorithms, this paper addresses the general impact of limited resource on surveillance efficiency. The general impact of limited resource on identifying a hidden group is experimentally studied; the task of identification is only done by following communications between suspec不再流行 发表于 2025-3-26 11:36:54
http://reply.papertrans.cn/47/4653/465282/465282_28.pngchastise 发表于 2025-3-26 12:46:51
http://reply.papertrans.cn/47/4653/465282/465282_29.pnginduct 发表于 2025-3-26 19:34:40
Bifocals: Analyzing WebView Vulnerabilities in Android Applicationsb content. While this rich interaction simplifies developer support for multiple platforms, it exposes applications to attack. In this paper, we explore two WebView vulnerabilities: ., where malicious JavaScript can invoke Android application code, and ., which exposes a device’s file system to an a