Results 261 to 270 of about 11,604 (291)
Some of the next articles are maybe not open access.

Collision attack on NaSHA-384/512

2010 International Conference on Networking and Information Technology, 2010
NaSHA is a family of hash functions submitted by Markovski and Mileva, it is accepted as one of the first SHA-3 round candidates. In this paper, we present a collision attack on NaSHA for the output sizes 384-bit and 512-bit. This attack is based on the the weakness in the generate course of the state words, and the fact that the quasigroup operation ...
null Zhimin Li   +2 more
openaire   +1 more source

Cache-Collision Timing Attacks Against AES

2006
This paper describes several novel timing attacks against the common table-driven software implementation of the AES cipher. We define a general attack strategy using a simplified model of the cache to predict timing variation due to cache-collisions in the sequence of lookups performed by the encryption.
Joseph Bonneau, Ilya Mironov
openaire   +1 more source

Correlation-Enhanced Power Analysis Collision Attack

2010
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, has made further research in collision attacks seemingly in vain. In this work, we show that the principles of collision attacks can be adapted to efficiently break some ...
Amir Moradi   +2 more
openaire   +1 more source

Plaintext Recovery Attacks Against XTS Beyond Collisions

2020
\(\mathsf {XTS}\) is a popular encryption scheme for storage devices standardized by IEEE and NIST. It is based on Rogaway’s \(\mathsf {XEX}\) tweakable block cipher and is known to be secure up to the collisions between the blocks, thus up to around \(2^{n/2}\) blocks for n-bit blocks.
Takanori Isobe, Kazuhiko Minematsu
openaire   +1 more source

Restricted near collision attack on Plantlet

Journal of Cryptographic Engineering, 2023
Satyam Kumar   +5 more
openaire   +1 more source

Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection

2008
This paper presents algebraic collision attacks, a new powerful cryptanalytic method based on side-channel leakage which allows for low measurement counts needed for a successful key recovery in case of AES. As opposed to many other side-channel attacks, these techniques are essentially based on the internal structure of the attacked cryptographic ...
Andrey Bogdanov   +2 more
openaire   +1 more source

Integrative oncology: Addressing the global challenges of cancer prevention and treatment

Ca-A Cancer Journal for Clinicians, 2022
Jun J Mao,, Msce   +2 more
exaly  

Near Collision Attack Against Grain V1

2023
Subhadeep Banik   +2 more
openaire   +1 more source

Obesity and adverse breast cancer risk and outcome: Mechanistic insights and strategies for intervention

Ca-A Cancer Journal for Clinicians, 2017
Cynthia Morata-Tarifa   +1 more
exaly  

Home - About - Disclaimer - Privacy