Results 11 to 20 of about 211,629 (261)

Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion [PDF]

open access: yesarXiv, 2012
Recent advances in wireless technologies have enabled many new applications in Intelligent Transportation Systems (ITS) such as collision avoidance, cooperative driving, congestion avoidance, and traffic optimization.
Atia, George, Guirguis, Mina
core   +3 more sources

A Symbolic Intruder Model for Hash-Collision Attacks [PDF]

open access: yesCSTVA'06, France (25/09/2006), 2006
In the recent years, several practical methods have been published to compute collisions on some commonly used hash functions. In this paper we present a method to take into account, at the symbolic level, that an intruder actively attacking a protocol ...
Chevalier, Yannick, Kourjieh, Mounira
core   +3 more sources

Security of differential phase shift quantum key distribution against individual attacks [PDF]

open access: yes, 2005
We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks.
C. Bennett   +4 more
core   +2 more sources

Seeing Is Not Always Believing: Invisible Collision Attack and Defence on Pre-Trained Models [PDF]

open access: yesarXiv, 2023
Large-scale pre-trained models (PTMs) such as BERT and GPT have achieved great success in diverse fields. The typical paradigm is to pre-train a big deep learning model on large-scale data sets, and then fine-tune the model on small task-specific data ...
Deng, Minghang   +2 more
core   +1 more source

NMPC-Based Cooperative Strategy For A Target Pair To Lure Two Attackers Into Collision [PDF]

open access: yesIEEE Control Systems Letters, vol. 7, pp. 496-501, 2023, 2021
This paper presents a cooperative target defense strategy using nonlinear model-predictive control (NMPC) framework for a two--targets two--attackers (2T2A) game. The 2T2A game consists of two attackers and two targets. Each attacker needs to capture a designated target individually.
arxiv   +1 more source

Detection of attack behaviour of pig based on deep learning

open access: yesSystems Science & Control Engineering, 2023
Attack behaviour detection of the pig is a valid method to protect the health of pig. Due to the farm conditions and the illumination changes of the piggery, the images of the pig in the videos are often being overlapped, which lead to difficulties in ...
Yanwen Li   +3 more
doaj   +1 more source

Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack [PDF]

open access: yes, 2016
The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric ...
Daisuke SUZUKI   +2 more
core   +2 more sources

Algebraic Collision Attacks on Keccak

open access: yesIACR Transactions on Symmetric Cryptology, 2021
In this paper, we analyze the collision resistance of the two smallest versions of Keccak which have a width of 200 and 400 bits respectively. We show that algebraic and linearization techniques can serve collision cryptanalysis by using some interesting
Rachelle Heim Boissier   +2 more
doaj   +1 more source

Internal collision attack on Maraca [PDF]

open access: yes, 2009
We present an internal collision attack against the new hash function Maraca which has been submitted to the SHA-3 competition. This attack requires 2^{237} calls to the round function and its complexity is lower than the complexity of the generic ...
Canteaut, Anne, Naya-Plasencia, Maria
core   +1 more source

Differential fault analysis on EMV application cryptogram

open access: yes网络与信息安全学报, 2016
The process of application cryptogram in EMV was researched and dummy bits in session key were found.Based on the session key’s dummy bits and compressive property of DES’s Sbox,much information of the application cryptogram master key was got by using ...
Qian PENG, Zeng-ju LI, Ru-hui SHI
doaj   +3 more sources

Home - About - Disclaimer - Privacy