Remarks on Peinado et al.'s Analysis of J3Gen.

Sensors (Basel)

Internet Interdisciplinary Institute, Universitat Oberta de Catalunya, Roc Boronat 117, 08018 Barcelona, Spain.

Published: March 2015

Peinado et al. analyzed the security of the J3Gen pseudorandom number generator proposed by Melià-Seguí et al., and claimed weaknesses regarding its security properties. They also presented a deterministic attack based on the decimation of the J3Gen output sequences. We show that the assumptions made by Peinado et al. are not correct and that the proposed deterministic attack against J3Gen does not hold in practice.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4435199PMC
http://dx.doi.org/10.3390/s150306217DOI Listing

Publication Analysis

Top Keywords

deterministic attack
8
remarks peinado
4
peinado al's
4
al's analysis
4
j3gen
4
analysis j3gen
4
j3gen peinado
4
peinado analyzed
4
analyzed security
4
security j3gen
4

Similar Publications

The human immune system can recognize, attack, and eliminate cancer cells, but cancers can escape this immune surveillance. Variants of ecological predator-prey models can capture the dynamics of such cancer control mechanisms by adaptive immune system cells. These dynamical systems describe, e.

View Article and Find Full Text PDF

This article is concerned with the deterministic finite automaton-mode-dependent (DFAMD) exponential stability problem of impulsive switched memristive neural networks (SMNNs) with aperiodic asynchronous attacks and the network covert channel. First, unlike the existing literature on SMNNs, this article focuses on DFA to drive mode switching, which facilitates precise system behavior modeling based on deterministic rules and input characters. To eliminate the periodicity and consistency constraints of traditional attacks, this article presents the multichannel aperiodic asynchronous denial-of-service (DoS) attacks, allowing for the diversity of attack sequences.

View Article and Find Full Text PDF

Objective: To delineate the structural connectome alterations in patients with chronic migraine (CM), episodic migraine (EM), and healthy controls (HCs).

Background: The pathogenesis of migraine chronification remains elusive, with structural brain network changes potentially playing a key role. However, there is a paucity of research employing graph theory analysis to explore changes in the whole brain structural networks in patients with CM and EM.

View Article and Find Full Text PDF

Decentralized Federated Learning improves data privacy and eliminates single points of failure by removing reliance on centralized storage and model aggregation in distributed computing systems. Ensuring the integrity of computations during local model training is a significant challenge, especially before sharing gradient updates from each local client. Current methods for ensuring computation integrity often involve patching local models to implement cryptographic techniques, such as Zero-Knowledge Proofs.

View Article and Find Full Text PDF

The rapid changes in the shipping fleet during the last decades has increased the ship-induced loads and, thus, their impact on infrastructures, margin protections and ecosystems. Primary waves have been pointed out as the cause of those impacts, with heights that can exceed 2 m and periods around 2 minutes. Consequently, extensive literature can be found on their estimation mainly from a deterministic perspective with methods based on datasets limited to one location, making difficult their generalization.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!