Results 281 to 290 of about 1,691,785 (320)

Group Collision Attack

IEEE Transactions on Information Forensics and Security, 2019
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate the key candidates from the most possible one to the least possible one, which can be regarded as optimal tools of key search.
Changhai Ou   +3 more
semanticscholar   +2 more sources

Near Collision Attack Against Grain V1

International Conference on Applied Cryptography and Network Security, 2023
S. Banik, Daniel Collins, W. Meier
semanticscholar   +2 more sources

Correlation-Enhanced Power Analysis Collision Attack

Workshop on Cryptographic Hardware and Embedded Systems, 2010
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, has made further research in collision attacks seemingly in vain. In this work, we show that the principles of collision attacks can be adapted to efficiently break some ...
A. Moradi, Oliver Mischke, T. Eisenbarth
semanticscholar   +2 more sources

Using the Collision Attack for Breaking Cryptographic Modes

International Conference on Computing Communication and Networking Technologies, 2022
Presently the cipher system that is considered to be the industry gold standard is the Advanced Encryption Standard paired with the Cipher Block Chaining cryptographic mode (AES with CBC).
Albert H Carlson   +2 more
semanticscholar   +1 more source

Trident: A Hybrid Correlation-Collision GPU Cache Timing Attack for AES Key Recovery

International Symposium on High-Performance Computer Architecture, 2021
Given the parallel processing capabilities of Graphics Processing Units (GPUs), many applications are exploiting GPUs and cryptographic systems have also begun to leverage GPUs to accelerate encryption/decryption.
Jaeguk Ahn   +6 more
semanticscholar   +1 more source

How to Launch a Powerful Side-Channel Collision Attack?

IEEE transactions on computers
A cryptographic implementation produces very similar power leakages when fed with the same input. Side-channel collision attacks exploit these similarities to establish the relationship between sub-keys and improve the efficiency of key recovery ...
Jiangshan Long   +5 more
semanticscholar   +1 more source

Traffic Collision Avoidance System: Threat Actor Model and Attack Taxonomy

2020 New Trends in Civil Aviation (NTCA), 2020
As air travel increases across the globe, the opportunities for exploiting air communications increase as well. In modern aviation technology, the Traffic Collision Avoidance System (TCAS) is used to deter mid-air collisions between aircraft.
John Hannah, R. Mills, Richard Dill
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy