Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo+4 more
doaj +1 more source
Design of distributed guidance laws for multi-UAV cooperative attacking a moving target based on reducing surrounding area [PDF]
In this paper, two cooperative guidance laws based on the area around the target of multiattackers are designed to deal with the problem of cooperative encirclement or simultaneous attack in the case of known target acceleration and unknown target acceleration.
arxiv
Distributed Optimal Guidance Laws for Multiple Unmanned Aerial Vehicles Attacking A Moving Target [PDF]
In this paper, two cooperative guidance laws based on two-point boundary value are designed to deal with the problem of cooperative encirclement and simultaneous attack under condition of both known target acceleration and unknown target acceleration.
arxiv
Collision Attack and Pseudorandomness of Reduced-Round Camellia [PDF]
Wenling Wu, Dengguo Feng, Hua Chen
openalex +1 more source
Multiple-Differential Side-Channel Collision Attacks on AES [PDF]
Andrey Bogdanov
openalex +1 more source
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting [PDF]
Amir Moradi+5 more
openalex +1 more source
Statistical Tools Flavor Side-Channel Collision Attacks [PDF]
Amir Moradi
openalex +1 more source
Demo: Sequential Attacks on Kalman Filter-based Forward Collision Warning Systems
Yuzhe Ma+4 more
openalex +1 more source
A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism [PDF]
Ye Yuan+3 more
openalex +1 more source
Defense Strategies for Autonomous Multi-agent Systems: Ensuring Safety and Resilience Under Exponentially Unbounded FDI Attacks [PDF]
False data injection attacks pose a significant threat to autonomous multi-agent systems (MASs). Existing attack-resilient control strategies generally have strict assumptions on the attack signals and overlook safety constraints, such as collision avoidance.
arxiv