gout109
发表于 2025-3-25 04:58:36
https://doi.org/10.1007/978-3-319-05149-9anomaly detection; cryptography; denial of service attacks; intrusion detection; mobile security
Mindfulness
发表于 2025-3-25 09:38:28
LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processorseral-purpose processors. Our experiments show that LEA is faster than AES on Intel, AMD, ARM, and ColdFire platforms. LEA can be also implemented to have tiny code size. Its hardware implementation has a competitive throughput per area. It is secure against all the existing attacks on block ciphers.
Antarctic
发表于 2025-3-25 12:03:54
Some New Weaknesses in the RC4 Stream Cipheroretical proof of this bias. This bias immediately provide distinguisher for RC4, and ciphertext only attack on broadcast RC4. Additionally, we discover some new weaknesses of the keystream bytes even after the first . rounds of the PRGA, where . is the size of the RC4 permutation, generally, .. The
皱痕
发表于 2025-3-25 16:22:03
http://reply.papertrans.cn/47/4653/465282/465282_24.png
habitat
发表于 2025-3-25 21:54:08
A General Method to Evaluate the Correlation of Randomness Tests tests. Firstly, we deduce the distribution that independent randomness tests should obey, then evaluate whether the randomness tests are independent or not based on hypothesis test. Using this method, we research the correlation of some statistical tests included in the NIST SP 800-22 suits, which
craving
发表于 2025-3-26 00:25:45
http://reply.papertrans.cn/47/4653/465282/465282_26.png
删减
发表于 2025-3-26 04:40:35
Dynamic Surveillance: A Case Study with Enron Email Data Setgn stronger anonymity algorithms, this paper addresses the general impact of limited resource on surveillance efficiency. The general impact of limited resource on identifying a hidden group is experimentally studied; the task of identification is only done by following communications between suspec
不再流行
发表于 2025-3-26 11:36:54
http://reply.papertrans.cn/47/4653/465282/465282_28.png
chastise
发表于 2025-3-26 12:46:51
http://reply.papertrans.cn/47/4653/465282/465282_29.png
induct
发表于 2025-3-26 19:34:40
Bifocals: Analyzing WebView Vulnerabilities in Android Applicationsb content. While this rich interaction simplifies developer support for multiple platforms, it exposes applications to attack. In this paper, we explore two WebView vulnerabilities: ., where malicious JavaScript can invoke Android application code, and ., which exposes a device’s file system to an a