Results 11 to 20 of about 1,691,785 (320)
In this paper, we propose a novel key recovery attack against secure ECDSA signature generation employing regular table-based scalar multiplication.
Sunghyun Jin +4 more
doaj +3 more sources
Preimage and Collision Attacks on MD2 [PDF]
This paper contains several attacks on the hash function MD2 which has a hash code size of 128 bits. At Asiacrypt 2004 Muller presents the first known preimage attack on MD2. The time complexity of the attack is about 2104 and the preimages consist always of 128 blocks.
Lars R. Knudsen, John Erik Mathiassen
openalex +2 more sources
Trust-Based Distributed Authentication Method for Collision Attack Avoidance in VANETs
A vehicular ad hoc network (VANET) is a collection of mobile vehicles that aids roadside communication through vehicle-to-vehicle and vehicle-to-infrastructure operation modes.
Amr Tolba
openalex +2 more sources
Plaintext-based Side-channel Collision Attack [PDF]
Side-channel Collision Attacks (SCCA) is a classical method that exploits information dependency leaked during cryptographic operations. Unlike collision attacks that seek instances where two different inputs to a cryptographic algorithm yield identical ...
Lichao Wu +3 more
semanticscholar +2 more sources
An Efficient Collision Power Attack on AES Encryption in Edge Computing
Edge computing has become a promising paradigm for the context-aware and delay-sensitive IoT data analytics. For the sake of security, some cryptographic algorithms such as AES, RSA, and so on, are employed for the encryption communication and ...
Yongchuan Niu +3 more
doaj +2 more sources
Understanding realistic attacks on airborne collision avoidance systems [PDF]
AbstractAirborne collision avoidance systems provide an onboard safety net should normal air traffic control procedures fail to keep aircraft separated. These systems are widely deployed and have been constantly refined over the past three decades, usually in response to near misses or mid-air collisions.
Matthew Smith +3 more
openalex +3 more sources
Autonomous collision attack on OCSP services [PDF]
16 pages, 4 ...
Ken Ivanov
openalex +3 more sources
Hash functions have been among the most scrutinized cryptographic primitives in the previous decade, mainly due to the cryptanalysis breakthroughs on MD-SHAfamily and the NIST SHA-3 competition that followed. Grindahl is a hash function proposed at FSE 2007 that inspired several SHA-3 candidates.
Thomas Peyrin
semanticscholar +2 more sources
Practical Collision Attack on 40-Step RIPEMD-128 [PDF]
In the last few years, the hash functions are the very common and essential primitives implemented in lots of fields. RIPEMD-128, a member of MD-family hash function, has been found collisions on the full round. In this paper, we further analyze the property about the security against collision attack of RIPEMD-128.
Gaoli Wang
semanticscholar +5 more sources
Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing
Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge servers). Side-channel attacks main threaten to these devices.
Yaoling Ding +5 more
doaj +2 more sources

