Results 201 to 210 of about 1,630,039 (238)
Some of the next articles are maybe not open access.
Earthquake — A NoC-based optimized differential cache-collision attack for MPSoCs
Design, Automation and Test in Europe, 2018C. Reinbrecht+3 more
semanticscholar +1 more source
Collision Attack on the Hamsi-256 Compression Function
2012Hamsi-256 is a cryptographic hash functions submitted by Kucuk to the NIST SHA-3 competition in 2008. It was selected by NIST as one of the 14 round 2 candidates in 2009. Even though Hamsi-256 did not make it to the final round in 2010 it is still an interesting target for cryptanalysts.
Mario Lamberger+2 more
openaire +2 more sources
New Collision Attacks on Round-Reduced Keccak
2017In this paper, we focus on collision attacks against Keccak hash function family and some of its variants. Following the framework developed by Dinur et al. at FSE 2012 where 4-round collisions were found by combining 3-round differential trails and 1-round connectors, we extend the connectors one round further hence achieve collision attacks for up to
Meicheng Liu+4 more
openaire +2 more sources
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
IACR Cryptology ePrint Archive, 2018A. Wiemers, Dominik Klein
semanticscholar +1 more source
Mitigating stealthy collision attack in energy harvesting motivated networks
IEEE Military Communications Conference, 2017Cong Pu+3 more
semanticscholar +1 more source
Group Verification Based Multiple-Differential Collision Attack
International Conference on Information, Communications and Signal Processing, 2016Changhai Ou+4 more
semanticscholar +1 more source
Side-channel collision attack based on multiple-bits
International Conference on Anti-counterfeiting, Security, and Identification, 2017Ye Yuan+3 more
semanticscholar +1 more source
Insect species richness affects plant responses to multi‐herbivore attack
New Phytologist, 2021Maite Fernández De Bobadilla+2 more
exaly
A review of cancer immunotherapy toxicity
Ca-A Cancer Journal for Clinicians, 2020Lucy Boyce Kennedy
exaly
Exploring the Attack Surface of Blockchain: A Comprehensive Survey
IEEE Communications Surveys and Tutorials, 2020Muhammad Saad+2 more
exaly