Loading...
Search for: multiple-data
0.009 seconds

    An improvement of collision probability in biased birthday attack against A5/1 stream cipher

    , Article 2010 European Wireless Conference, EW 2010, 12 April 2010 through 15 April 2010, Lucca ; April , 2010 , Pages 444-448 ; 9781424459995 (ISBN) Kourkchi, H ; Tavakoli, H ; Naderi, M ; Sharif University of Technology
    2010
    Abstract
    A5/1 is the strong version of the encryption algorithm on GSM (Global System for Mobile communications) used in many countries. It is constructed of a combination of three LFSRs (Linear Feedback Shift Registers) with irregular clocking manner. One of the most practical attacks against this algorithm is time-memory trade-off attack, which is based on birthday paradox. The goal of this attack is to find any intersection between precomputed LFSRs states set and set of states generating the output bits in the actual execution of the algorithm. In order to increase feasibility of this attack, the biased birthday attack was introduced. In this attack special states producing a specific pattern in... 

    Joint, partially-joint, and individual independent component analysis in multi-subject fMRI data

    , Article IEEE Transactions on Biomedical Engineering ; Volume 67, Issue 7 , 2020 , Pages 1969-1981 Pakravan, M ; Shamsollahi, M. B ; Sharif University of Technology
    IEEE Computer Society  2020
    Abstract
    Objective: Joint analysis of multi-subject brain imaging datasets has wide applications in biomedical engineering. In these datasets, some sources belong to all subjects (joint), a subset of subjects (partially-joint), or a single subject (individual). In this paper, this source model is referred to as joint/partially-joint/individual multiple datasets unidimensional (JpJI-MDU), and accordingly, a source extraction method is developed. Method: We present a deflation-based algorithm utilizing higher order cumulants to analyze the JpJI-MDU source model. The algorithm maximizes a cost function which leads to an eigenvalue problem solved with thin-SVD (singular value decomposition)...