Simplifying algebraic attacks with univariate analysis

被引:0
作者
Helleseth, Tor [1 ]
Ronjom, Sondre [2 ]
机构
[1] Selmer Center, Department of Informatics, University of Bergen, P.O. Box 7803, N-5020 Bergen, Norway
[2] NSM, Rødskiferveien 20, 1352 Brum, Norway
来源
2011 Information Theory and Applications Workshop, ITA 2011 - Conference Proceedings | 2011年
关键词
Compendex;
D O I
5743578
中图分类号
学科分类号
摘要
Algebra
引用
收藏
页码:153 / 159
相关论文
共 10 条
  • [1] Characterization of the univariate and multivariate techniques on the analysis of simulated and fMRI datasets with visual task
    Chen, C.L.
    Wu, T.H.
    Wu, Y.T.
    Huang, Y.H.
    Lee, J.S.
    IEEE Nucl. Sci. Symp. Conf. Rec., 2003, (2468-2472):
  • [2] Algebraic analysis on asymptotic stability of continuous dynamical systems
    LMIB, School of Mathematics and Systems Science, Beihang University, China
    Proc Int Symp Symbol Algebraic Comput ISSAC, (313-320):
  • [3] Analysis of jamming and spoofing cyber-attacks on drones
    Pey, Jeferson Nascimento Aquilar
    Nze, Georges Daniel Amvame
    Albuquerque, Robson de Oliveira
    Iberian Conference on Information Systems and Technologies, CISTI, 2022, 2022-June
  • [4] Evolutionary game analysis of engendering mechanism for pirate attacks
    Zhu, Le-Qun
    Lv, Jing
    Li, Jing
    Jiaotong Yunshu Xitong Gongcheng Yu Xinxi/Journal of Transportation Systems Engineering and Information Technology, 2015, 15 (04): : 24 - 30
  • [5] Detecting DDoS attacks against Web server using time series analysis
    Wu, Qing-Tao
    Shao, Zhi-Qing
    Wuhan Univ J Nat Sci, 1 (175-180):
  • [6] Analysis of Cyber Attacks and Cyber Incident Patterns over APCERT Member Countries
    Sarowa, Sandeep Kumar
    Bhanot, Bhisham
    Kumar, Vijay
    AIST 2022 - 4th International Conference on Artificial Intelligence and Speech Technology, 2022,
  • [7] Universal Detection of Backdoor Attacks via Density-Based Clustering and Centroids Analysis
    Guo, Wei
    Tondi, Benedetta
    Barni, Mauro
    IEEE Transactions on Information Forensics and Security, 2024, 19 : 970 - 984
  • [8] Secure elliptic curve implementations: An analysis of resistance to power-attacks in a DSP processor
    Department of Electrical and Computer Engineering, University of Waterloo, Waterloo
    ON
    N2L 3G1, Canada
    不详
    ON, Canada
    Lect. Notes Comput. Sci., 1600, (114-128):
  • [9] Algebraic Algorithms for the Reliability Analysis of Multi-state k-out-of-n Systems
    Pascual-Ortigosa, Patricia
    Saenz-de-Cabezon, Eduardo
    Wynn, Henry P.
    ACM COMMUNICATIONS IN COMPUTER ALGEBRA, 2019, 53 (03): : 146 - 149
  • [10] Algebraic analysis of the topological properties of a banyan network and its application in fault-tolerant switching networks
    Park, Jae-Hyun
    Lee, Heung-Kyu
    J. Parallel Distrib. Comput., 6 (773-779):