|
|
|
Guilherme Perin, Lichao Wu and Stjepan Picek
The adoption of deep neural networks for profiling side-channel attacks opened new perspectives for leakage detection. Recent publications showed that cryptographic implementations featuring different countermeasures could be broken without feature selec...
ver más
|
|
|
|
|
|
|
Okan Bulut, Guher Gorgun, Tarid Wongvorachan and Bin Tan
Rapid guessing is an aberrant response behavior that commonly occurs in low-stakes assessments with little to no formal consequences for students. Recently, the availability of response time (RT) information in computer-based assessments has motivated re...
ver más
|
|
|
|
|
|
|
Muhammad Alfian, Umi Laili Yuhana, Eric Pardede and Akbar Noto Ponco Bimantoro
Assessment is one benchmark in measuring students? abilities. However, assessment results cannot necessarily be trusted, because students sometimes cheat or even guess in answering the questions. Therefore, to obtain valid results, it is necessary to sep...
ver más
|
|
|
|
|
|
|
Yiming Zhu, Dehua Zhou, Yuan Li, Beibei Song and Chuansheng Wang
Recently, significant progress has been made in the field of public key encryption with keyword search (PEKS), with a focus on optimizing search methods and improving the security and efficiency of schemes. Keyword frequency analysis is a powerful tool f...
ver más
|
|
|
|
|
|
|
Xiaotong Cui, Hongxin Zhang, Xing Fang, Yuanzhen Wang, Danzhi Wang, Fan Fan and Lei Shu
The leakage signals, including electromagnetic, energy, time, and temperature, generated during the operation of password devices contain highly correlated key information, which leads to security vulnerabilities. In traditional encryption algorithms, th...
ver más
|
|
|
|
|
|
|
Khumbelo Muthavhine and Mbuyu Sumbwanyambe
Cryptographic algorithms installed on Internet of Things (IoT) devices suffer many attacks. Some of these attacks include the differential linear attack (DL). The DL attack depends on the computation of the probability of differential-linear characterist...
ver más
|
|
|
|
|
|
|
Xiaozhou Guo, Yi Liu, Kaijun Tan, Wenyu Mao, Min Jin and Huaxiang Lu
In password guessing, the Markov model is still widely used due to its simple structure and fast inference speed. However, the Markov model based on random sampling to generate passwords has the problem of a high repetition rate, which leads to a low cov...
ver más
|
|
|
|
|
|
|
Robert Graczyk and Igal Sason
Stationary memoryless sources produce two correlated random sequences ????
X
n
and ????
Y
n
. A guesser seeks to recover ????
X
n
in two stages, by first guessing ????
Y
n
and then ????
X
n
. The contributions of this work are twofold: (1) We characte...
ver más
|
|
|
|
|
|
|
Diogo Remoaldo and Isabel Jesus
This paper presents the results obtained for the maximum power point tracking (MPPT) technique applied to a photovoltaic (PV) system, composed of five solar panels in series using two different methodologies. First, we considered a traditional Perturb an...
ver más
|
|
|
|
|
|
|
Anuj Kumar Singh, Arun Solanki, Anand Nayyar and Basit Qureshi
In the modern computing environment, smart cards are being used extensively, which are intended to authenticate a user with the system or server. Owing to the constrictions of computational resources, smart card-based systems require an effective design ...
ver más
|
|
|
|