Skip to search formSkip to main contentSkip to account menu
- Corpus ID: 33088072
@inproceedings{Bokut2017MathNetRuAR, title={Math-Net.Ru All Russian mathematical portal}, author={Leonid A. Bokut and E. I. Zelmanov and P. Zusmanovich and Victor G. Kac and L. G. Makar-Limanov and Yurii I Manin and S. P. Novikov and A. N. Parshin and V. P. Platonov and Iskander A. Taimanov and U. U. Umirbaev and I. P. Shestakov}, year={2017}, url={https://api.semanticscholar.org/CorpusID:33088072}}
- L. Bokut, E. I. Zelmanov, I. P. Shestakov
- Published 2017
- Mathematics
The problem of modelling (reconstruction) of inputs in parabolic systems is considered. The solving algorithms are suggested. These algorithms are stable with respect to the informati onal noises and the measurement disturbances. General constructions are applied to the prob lem of simulation of groundwater contamination process. In this case the problem of model ling of varying intensities of pollutant sources is investigated
2 Citations
1
Figures and Tables from this paper
- figure 1
- table 1
- figure 2
- figure 3
2 Citations
- S. BarykinI. KapustinaS. SergeevV. Yadykin
- 2020
Economics, Mathematics
Journal of Open Innovation: Technology, Market…
Using a set of formalisms, a mathematical model has been developed, which will make it possible to search for optimal solutions based on the criterion of economic efficiency and will find application not only in transport problems but also in many industries and economic activities.
- 40
- PDF
- Melda FrancisA. KuruvillaLakshmi M
- 2022
Materials Science, Chemistry
Materials Chemistry and Physics
- 2
725 References
- Aleksandar KircanskiA. Youssef
- 2009
Computer Science
Selected Areas in Cryptography
This paper presents a practical fault analysis attack on Rabbit, a high speed scalable stream cipher with 128-bit key and a 64-bit initialization vector, in which the attacker is assumed to be able to fault a random bit of the internal state of the cipher but cannot control the exact location of injected faults.
- 27
- PDF
- Christophe ClavierBenedikt GierlichsI. Verbauwhede
- 2008
Computer Science
CT-RSA
A study of several fault attacks against the block cipher IDEA, which is the first Differential Fault Analysis of IDEA to the best of the authors' knowledge, recovers 93 out of 128 key bits exploiting about only 10 faults.
- 44
- PDF
- G. PiretJ. Quisquater
- 2003
Computer Science
CHES
The differential fault attack technique is able to break the AES-128 with only 2 faulty ciphertexts, assuming the fault occurs between the antepenultimate and the penultimate MixColumn; this is better than the previous fault attacks against AES.
- 623
- Highly Influential
- PDF
- Xin-jie ZhaoShize Guo Dawu Gu
- 2014
Computer Science, Mathematics
2014 Workshop on Fault Diagnosis and Tolerance in…
The security of GOST against side-channel attacks is examined with algebraic fault analysis (AFA), which combines the algebraic cryptanalysis with the fault attack and proves that keeping some components in a cipher secret cannot guarantee its security against fault attacks.
- 13
- PDF
- Christophe ClavierAntoine Wurcker
- 2013
Computer Science
2013 Workshop on Fault Diagnosis and Tolerance in…
This paper proposes a chosen plaintext FIRE attack based on ineffective fault analysis (IFA) in the "byte stuck at 0" fault model and describes a step-by-step procedure that recovers the AES-like secret parameters without requiring the knowledge of the encryption key.
- 23
- Christophe Giraud
- 2003
Computer Science
AES Conference
Two different DFA attacks on the AES are described: the first uses a fault model that induces a fault on only one bit of an intermediate result, hence allowing us to obtain the key by using 50 faulty ciphertexts for an AES-128, and the second uses a more realistic fault model, which assumes that a whole byte may be induced.
- 361
- PDF
- Takanori Isobe
- 2012
Computer Science
Journal of Cryptology
This paper shows the first single-key attack, which works for all key classes, on the full GOST block cipher, using a new attack framework called Reflection-Meet-in-the-Middle Attack and uses additional novel techniques which are the effective MITM techniques using equivalent keys on a small number of rounds.
- 116
- PDF
- E. BihamA. Shamir
- 1997
Computer Science, Mathematics
CRYPTO
This work states that this attack is applicable only to public key cryptosystems such as RSA, and not to secret key algorithms such as the Data Encryption Standard (DES).
- 1,694
- PDF
- Itai DinurO. DunkelmanA. Shamir
- 2011
Computer Science
IACR Cryptol. ePrint Arch.
A new fixed point property is introduced and a better way to attack 8-round GOST in order to find improved attacks on full GOST, which can be reduced from an impractical 264 to a practical 236 without changing the 2224 time complexity.
- 71
- PDF
- Michael TunstallDebdeep MukhopadhyaySubidh Ali
- 2009
Computer Science
WISTP
A differential fault attack that can be applied to the AES using a single fault, which demonstrates that when a single random byte fault is induced at the input of the eighth round, the AES key can be deduced using a two stage algorithm.
- 353
- PDF
...
...
Related Papers
Showing 1 through 3 of 0 Related Papers
Fig. 1. Four estimators t(x) of в when x ~ N(9, 1).
Published in 2017
Math-Net.Ru All Russian mathematical portal
L. BokutE. I. Zelmanov I. P. Shestakov
Figure 1 of 4