Results 281 to 290 of about 1,585,996 (337)

A kinetic model of antigen-dependent IgG oligomerization and complement binding

open access: yes
Strasser J   +7 more
europepmc   +1 more source

Group Collision Attack

IEEE Transactions on Information Forensics and Security, 2019
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate the key candidates from the most possible one to the least possible one, which can be regarded as optimal tools of key search.
Changhai Ou   +3 more
semanticscholar   +3 more sources

Efficient Collision Attack Frameworks for RIPEMD-160

IACR Cryptology ePrint Archive, 2019
RIPEMD-160 is an ISO/IEC standard and has been applied to generate the Bitcoin address with SHA-256. Due to the complex dual-stream structure, the first collision attack on reduced RIPEMD-160 presented by Liu, Mendel and Wang at Asiacrypt 2017 only reaches 30 steps, having a time complexity of \(2^{70}\).
F. Liu
semanticscholar   +4 more sources

Related-Key Collision Attack of AES_256

2010 International Symposium on Intelligence Information Processing and Trusted Computing, 2010
This paper utilized the arrangement points of AES_256 key, analyzed the difference features of AES_256, and found a method of collision attack. This paper also made use of connection differential features and collision method of AES_256 to analyze the 72
Zhihua Hu, Zhongping Qin
semanticscholar   +3 more sources

Home - About - Disclaimer - Privacy