Results 171 to 180 of about 1,630,039 (238)
Lightweight and Efficient Authentication and Key Distribution Scheme for Cloud-Assisted IoT for Telemedicine. [PDF]
Lee HJ+6 more
europepmc +1 more source
Abiotic formation of hexoses and disaccharides in aqueous microdroplets. [PDF]
Edwards MQ, Holden DT, Cooks RG.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Transactions on Information Forensics and Security, 2019
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate the key candidates from the most possible one to the least possible one, which can be regarded as optimal tools of key search.
Changhai Ou+3 more
semanticscholar +3 more sources
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate the key candidates from the most possible one to the least possible one, which can be regarded as optimal tools of key search.
Changhai Ou+3 more
semanticscholar +3 more sources
Efficient Collision Attack Frameworks for RIPEMD-160
IACR Cryptology ePrint Archive, 2019RIPEMD-160 is an ISO/IEC standard and has been applied to generate the Bitcoin address with SHA-256. Due to the complex dual-stream structure, the first collision attack on reduced RIPEMD-160 presented by Liu, Mendel and Wang at Asiacrypt 2017 only reaches 30 steps, having a time complexity of \(2^{70}\).
F. Liu
semanticscholar +4 more sources
Related-Key Collision Attack of AES_256
2010 International Symposium on Intelligence Information Processing and Trusted Computing, 2010This paper utilized the arrangement points of AES_256 key, analyzed the difference features of AES_256, and found a method of collision attack. This paper also made use of connection differential features and collision method of AES_256 to analyze the 72 bytes of the initial key of AES_256, with a complexity of 2128.
Zhihua Hu, Zhongping Qin
semanticscholar +3 more sources
Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD
Journal of Computer Science and Technology, 2013The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions, which consist of two parallel branches. Extended MD4 was proposed by Rivest in 1990, and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation, 1988 ~ 1992).
Gao-Li Wang
semanticscholar +3 more sources