New strategy for searching disturbance vector of SHA-1 collision attack [PDF]
Hao Feng +3 more
openalex +1 more source
Analysis of collision probability in Merkle trees in the random oracle model
This work analyzes the probability of collisions in Merkle graphs, with a focus on a specific class of attacks in balanced Merkle trees. To provide a tractable model, each hash function is modeled as an independent random oracle with finite input space ...
Corsi Alessandro +2 more
doaj +1 more source
Fault Attack of SMS4 Based on Internal Collisions
Renjie Zhu, Ou Qingyu, Fang Luo
openalex +1 more source
Statistical Tools Flavor Side-Channel Collision Attacks [PDF]
By examining the similarity of side-channel leakages, collision attacks evade the indispensable hypothetical leakage models of multi-query based side-channel distinguishers like correlation power analysis and mutual information analysis attacks. Most of the side-channel collision attacks compare two selective observations, what makes them similar to ...
openaire +1 more source
A Secure Blockchain-Based Vehicular Collision Avoidance Protocol: Detecting and Preventing Blackhole Attacks [PDF]
Mosab S. Manaseer, Maram Bani Younes
openalex +1 more source
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories [PDF]
Xiaoyang Dong +5 more
openalex +1 more source
A second pre-image attack and a collision attack to cryptographic hash function lux
SULAK Fatih KOÇAK
openalex +1 more source
SHA-256 Collision Attack with Programmatic SAT
To appear in the 2024 Proceedings of the International Workshop on Satisfiability Checking and Symbolic ...
Alamgir, Nahiyan +2 more
openaire +2 more sources
RFID-ExSim: A multi-scenario experimental dataset for collision timing, tag cloning, replay injection, and flooding stress in passive RFID systems. [PDF]
Hmimou Y +4 more
europepmc +1 more source
Trust-Based Distributed Authentication Method for Collision Attack Avoidance in VANETs
Amr Tolba
openalex +1 more source

