Results 171 to 180 of about 1,630,039 (238)

Group Collision Attack

IEEE Transactions on Information Forensics and Security, 2019
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate the key candidates from the most possible one to the least possible one, which can be regarded as optimal tools of key search.
Changhai Ou   +3 more
semanticscholar   +3 more sources

Efficient Collision Attack Frameworks for RIPEMD-160

IACR Cryptology ePrint Archive, 2019
RIPEMD-160 is an ISO/IEC standard and has been applied to generate the Bitcoin address with SHA-256. Due to the complex dual-stream structure, the first collision attack on reduced RIPEMD-160 presented by Liu, Mendel and Wang at Asiacrypt 2017 only reaches 30 steps, having a time complexity of \(2^{70}\).
F. Liu
semanticscholar   +4 more sources

Related-Key Collision Attack of AES_256

2010 International Symposium on Intelligence Information Processing and Trusted Computing, 2010
This paper utilized the arrangement points of AES_256 key, analyzed the difference features of AES_256, and found a method of collision attack. This paper also made use of connection differential features and collision method of AES_256 to analyze the 72 bytes of the initial key of AES_256, with a complexity of 2128.
Zhihua Hu, Zhongping Qin
semanticscholar   +3 more sources

Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

Journal of Computer Science and Technology, 2013
The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions, which consist of two parallel branches. Extended MD4 was proposed by Rivest in 1990, and RIPEMD was devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation, 1988 ~ 1992).
Gao-Li Wang
semanticscholar   +3 more sources

Home - About - Disclaimer - Privacy