Results 281 to 290 of about 1,678,458 (327)
SMAD-LDS: enhanced secure message authentication and dissemination with lightweight digital signature in the Internet of Vehicles. [PDF]
Ahmed IZ, Hifny Y, Sadek RA.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Transactions on Information Forensics and Security, 2019
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate the key candidates from the most possible one to the least possible one, which can be regarded as optimal tools of key search. However, the application of them is limited by very large key candidate space and computing power consumption.
Changhai Ou +3 more
openaire +2 more sources
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate the key candidates from the most possible one to the least possible one, which can be regarded as optimal tools of key search. However, the application of them is limited by very large key candidate space and computing power consumption.
Changhai Ou +3 more
openaire +2 more sources
Using the Collision Attack for Breaking Cryptographic Modes
International Conference on Computing Communication and Networking Technologies, 2022Presently the cipher system that is considered to be the industry gold standard is the Advanced Encryption Standard paired with the Cipher Block Chaining cryptographic mode (AES with CBC).
Albert H Carlson +2 more
semanticscholar +1 more source
Trident: A Hybrid Correlation-Collision GPU Cache Timing Attack for AES Key Recovery
International Symposium on High-Performance Computer Architecture, 2021Given the parallel processing capabilities of Graphics Processing Units (GPUs), many applications are exploiting GPUs and cryptographic systems have also begun to leverage GPUs to accelerate encryption/decryption.
Jaeguk Ahn +6 more
semanticscholar +1 more source
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009
In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differential is the most important part of collision attacks against hash functions. So far, there are only three other message differentials attack published, one of which is 6 bits difference and two are 1 bit difference.
Wang Yu, Chen Jianhua, He Debiao
openaire +1 more source
In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differential is the most important part of collision attacks against hash functions. So far, there are only three other message differentials attack published, one of which is 6 bits difference and two are 1 bit difference.
Wang Yu, Chen Jianhua, He Debiao
openaire +1 more source

