Results 201 to 210 of about 1,630,039 (238)
Some of the next articles are maybe not open access.

Earthquake — A NoC-based optimized differential cache-collision attack for MPSoCs

Design, Automation and Test in Europe, 2018
C. Reinbrecht   +3 more
semanticscholar   +1 more source

Collision Attack on the Hamsi-256 Compression Function

2012
Hamsi-256 is a cryptographic hash functions submitted by Kucuk to the NIST SHA-3 competition in 2008. It was selected by NIST as one of the 14 round 2 candidates in 2009. Even though Hamsi-256 did not make it to the final round in 2010 it is still an interesting target for cryptanalysts.
Mario Lamberger   +2 more
openaire   +2 more sources

New Collision Attacks on Round-Reduced Keccak

2017
In this paper, we focus on collision attacks against Keccak hash function family and some of its variants. Following the framework developed by Dinur et al. at FSE 2012 where 4-round collisions were found by combining 3-round differential trails and 1-round connectors, we extend the connectors one round further hence achieve collision attacks for up to
Meicheng Liu   +4 more
openaire   +2 more sources

Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack

IACR Cryptology ePrint Archive, 2018
A. Wiemers, Dominik Klein
semanticscholar   +1 more source

Mitigating stealthy collision attack in energy harvesting motivated networks

IEEE Military Communications Conference, 2017
Cong Pu   +3 more
semanticscholar   +1 more source

Group Verification Based Multiple-Differential Collision Attack

International Conference on Information, Communications and Signal Processing, 2016
Changhai Ou   +4 more
semanticscholar   +1 more source

Side-channel collision attack based on multiple-bits

International Conference on Anti-counterfeiting, Security, and Identification, 2017
Ye Yuan   +3 more
semanticscholar   +1 more source

Insect species richness affects plant responses to multi‐herbivore attack

New Phytologist, 2021
Maite Fernández De Bobadilla   +2 more
exaly  

A review of cancer immunotherapy toxicity

Ca-A Cancer Journal for Clinicians, 2020
Lucy Boyce Kennedy
exaly  

Exploring the Attack Surface of Blockchain: A Comprehensive Survey

IEEE Communications Surveys and Tutorials, 2020
Muhammad Saad   +2 more
exaly  

Home - About - Disclaimer - Privacy