Results 11 to 20 of about 1,691,785 (320)

Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries

open access: diamondTransactions on Cryptographic Hardware and Embedded Systems, 2021
In this paper, we propose a novel key recovery attack against secure ECDSA signature generation employing regular table-based scalar multiplication.
Sunghyun Jin   +4 more
doaj   +3 more sources

Preimage and Collision Attacks on MD2 [PDF]

open access: bronze, 2005
This paper contains several attacks on the hash function MD2 which has a hash code size of 128 bits. At Asiacrypt 2004 Muller presents the first known preimage attack on MD2. The time complexity of the attack is about 2104 and the preimages consist always of 128 blocks.
Lars R. Knudsen, John Erik Mathiassen
openalex   +2 more sources

Trust-Based Distributed Authentication Method for Collision Attack Avoidance in VANETs

open access: goldIEEE Access, 2018
A vehicular ad hoc network (VANET) is a collection of mobile vehicles that aids roadside communication through vehicle-to-vehicle and vehicle-to-infrastructure operation modes.
Amr Tolba
openalex   +2 more sources

Plaintext-based Side-channel Collision Attack [PDF]

open access: yesIACR Communications in Cryptology
Side-channel Collision Attacks (SCCA) is a classical method that exploits information dependency leaked during cryptographic operations. Unlike collision attacks that seek instances where two different inputs to a cryptographic algorithm yield identical ...
Lichao Wu   +3 more
semanticscholar   +2 more sources

An Efficient Collision Power Attack on AES Encryption in Edge Computing

open access: yesIEEE Access, 2019
Edge computing has become a promising paradigm for the context-aware and delay-sensitive IoT data analytics. For the sake of security, some cryptographic algorithms such as AES, RSA, and so on, are employed for the encryption communication and ...
Yongchuan Niu   +3 more
doaj   +2 more sources

Understanding realistic attacks on airborne collision avoidance systems [PDF]

open access: hybridJournal of Transportation Security, 2022
AbstractAirborne collision avoidance systems provide an onboard safety net should normal air traffic control procedures fail to keep aircraft separated. These systems are widely deployed and have been constantly refined over the past three decades, usually in response to near misses or mid-air collisions.
Matthew Smith   +3 more
openalex   +3 more sources

Collision Attack on Grindahl

open access: yesJournal of Cryptology, 2015
Hash functions have been among the most scrutinized cryptographic primitives in the previous decade, mainly due to the cryptanalysis breakthroughs on MD-SHAfamily and the NIST SHA-3 competition that followed. Grindahl is a hash function proposed at FSE 2007 that inspired several SHA-3 candidates.
Thomas Peyrin
semanticscholar   +2 more sources

Practical Collision Attack on 40-Step RIPEMD-128 [PDF]

open access: yes2020 2nd International Conference on Artificial Intelligence and Advanced Manufacture (AIAM), 2014
In the last few years, the hash functions are the very common and essential primitives implemented in lots of fields. RIPEMD-128, a member of MD-family hash function, has been found collisions on the full round. In this paper, we further analyze the property about the security against collision attack of RIPEMD-128.
Gaoli Wang
semanticscholar   +5 more sources

Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing

open access: yesIEEE Access, 2019
Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge servers). Side-channel attacks main threaten to these devices.
Yaoling Ding   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy