Results 181 to 190 of about 1,630,039 (238)
Some of the next articles are maybe not open access.

Using the Collision Attack for Breaking Cryptographic Modes

International Conference on Computing Communication and Networking Technologies, 2022
Presently the cipher system that is considered to be the industry gold standard is the Advanced Encryption Standard paired with the Cipher Block Chaining cryptographic mode (AES with CBC).
Albert H Carlson   +2 more
semanticscholar   +1 more source

Collision Attack Framework on RIPEMD-128 [PDF]

open access: possible2020 2nd International Conference on Artificial Intelligence and Advanced Manufacture (AIAM), 2020
In the last few years, the hash functions are the very common and essential primitives implemented in lots of fields. RIPEMD-128, a member of MD-family hash function, has been found collisions on the full round. In this paper, we further analyze the property about the security against collision attack of RIPEMD-128.
Yang Yang, Guang Zeng, Jingyu Li
openaire   +1 more source

Trident: A Hybrid Correlation-Collision GPU Cache Timing Attack for AES Key Recovery

International Symposium on High-Performance Computer Architecture, 2021
Given the parallel processing capabilities of Graphics Processing Units (GPUs), many applications are exploiting GPUs and cryptographic systems have also begun to leverage GPUs to accelerate encryption/decryption.
Jaeguk Ahn   +6 more
semanticscholar   +1 more source

A New Collision Attack on MD5

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009
In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differential is the most important part of collision attacks against hash functions. So far, there are only three other message differentials attack published, one of which is 6 bits difference and two are 1 bit difference.
He Debiao, Chen Jianhua, Wang Yu
openaire   +2 more sources

Bitwise Collision Attack Based on Second-Order Distance

KSII Transactions on Internet and Information Systems, 2017
Correlation-enhanced collision attack has been proposed by Moradi et al. for several years. However, in practical operations, this method costs lots of time on trace acquisition, storage and averaging due to its bytewise collision detection.
Danhui Wang, An Wang
semanticscholar   +1 more source

Traffic Collision Avoidance System: Threat Actor Model and Attack Taxonomy

2020 New Trends in Civil Aviation (NTCA), 2020
As air travel increases across the globe, the opportunities for exploiting air communications increase as well. In modern aviation technology, the Traffic Collision Avoidance System (TCAS) is used to deter mid-air collisions between aircraft.
John Hannah, R. Mills, Richard Dill
semanticscholar   +1 more source

Fault Based Collision Attacks on AES [PDF]

open access: possible, 2006
In this paper we present a new class of collision attacks that are based on inducing faults into the encryption process. We combine the classical fault attack of Biham and Shamir with the concept of collision attacks of Schramm et al. Unlike previous fault attacks by Blomer and Seifert our new attacks only need bit flips not bit resets.
Johannes Blömer, Volker Krummel
openaire   +1 more source

How to Launch a Powerful Side-Channel Collision Attack?

IEEE transactions on computers
A cryptographic implementation produces very similar power leakages when fed with the same input. Side-channel collision attacks exploit these similarities to establish the relationship between sub-keys and improve the efficiency of key recovery ...
Jiangshan Long   +5 more
semanticscholar   +1 more source

Improved Collision Attacks on MD4 and MD5

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2007
At Eurocrypt'05, Wang et al. presented efficient collision attacks on MD5 and MD4 hash functions. They found a collision of MD5 with a complexity of less than 237 MD5 hash operations, and a collision of MD4 with complexity less than 28 MD4 hash operations. In their attack, the procedure to generate a collision is divided into 4 steps.
Noboru Kunihiro   +3 more
openaire   +2 more sources

Collision Attack on Boole

2009
Boole is a hash function designed by Gregory Rose and was submitted to the NIST Hash competition. It is a stream cipher based hash function which produces digests up to 512 bits. Different variants exist, namely Boole16, Boole32 and Boole64 where the number refers to word size in bits. Boole64 is considered as the official submission.
Tomislav Nad   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy