Results 1 to 10 of about 1,630,039 (238)

Deep Learning Side-Channel Collision Attack

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems, 2023
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific ...
Marvin Staib, Amir Moradi
doaj   +4 more sources

Automating Collision Attacks on RIPEMD-160

open access: diamondIACR Transactions on Symmetric Cryptology, 2023
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address with SHA-256. However, due to the complex doublebranch structure of RIPEMD-160, the best collision attack only reaches 36 out of 80 steps of RIPEMD-160 ...
Yingxin Li, Fukang Liu, Gaoli Wang
doaj   +4 more sources

Stochastic Collision Attack

open access: greenIEEE Transactions on Information Forensics and Security, 2017
On the one hand, collision attacks have been introduced in the context of side-channel analysis for attackers who exploit repeated code with the same data without having any knowledge of the leakage model. On the other hand, stochastic attacks have been introduced to recover leakage models of internally processed intermediate secret variables.
Nicolas Bruneau   +5 more
semanticscholar   +7 more sources

New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160

open access: diamondIACR Transactions on Symmetric Cryptology, 2019
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions designed in this time-period like MD4, MD5 and SHA-1.
Fukang Liu   +5 more
doaj   +4 more sources

Trust-Based Distributed Authentication Method for Collision Attack Avoidance in VANETs

open access: goldIEEE Access, 2018
A vehicular ad hoc network (VANET) is a collection of mobile vehicles that aids roadside communication through vehicle-to-vehicle and vehicle-to-infrastructure operation modes.
A.M.R. Tolba
doaj   +3 more sources

(Quantum) Collision Attacks on Reduced Simpira v2

open access: diamondIACR Transactions on Symmetric Cryptology, 2021
Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016. In this paper, we build an improved MILP model to count the differential and linear active Sboxes for Simpira v2, which achieves tighter bounds of the minimum number ...
Boyu Ni   +3 more
doaj   +5 more sources

Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256

open access: diamondIACR Transactions on Symmetric Cryptology, 2021
Recently, Hosoyamada and Sasaki (EUROCRYPT 2020), and Xiaoyang Dong et al. (ASIACRYPT 2020) proposed quantum collision attacks against AES-like hashing modes AES-MMO and AES-MP.
Amit Kumar Chauhan   +2 more
doaj   +3 more sources

Algebraic Collision Attacks on Keccak

open access: yesIACR Transactions on Symmetric Cryptology, 2021
In this paper, we analyze the collision resistance of the two smallest versions of Keccak which have a width of 200 and 400 bits respectively. We show that algebraic and linearization techniques can serve collision cryptanalysis by using some interesting
Rachelle Heim Boissier   +2 more
doaj   +5 more sources

Internal collision attack on Maraca [PDF]

open access: yes, 2009
We present an internal collision attack against the new hash function Maraca which has been submitted to the SHA-3 competition. This attack requires 2^{237} calls to the round function and its complexity is lower than the complexity of the generic ...
Canteaut, Anne, Naya-Plasencia, Maria
core   +4 more sources

Collision Attack on Grindahl [PDF]

open access: yesJournal of Cryptology, 2015
Hash functions have been among the most scrutinized cryptographic primitives in the previous decade, mainly due to the cryptanalysis breakthroughs on MD-SHAfamily and the NIST SHA-3 competition that followed. Grindahl is a hash function proposed at FSE 2007 that inspired several SHA-3 candidates.
Thomas Peyrin
semanticscholar   +2 more sources

Home - About - Disclaimer - Privacy