Results 281 to 290 of about 1,678,458 (327)

Traumatic Spinal Cord Injury and Subsequent Risk of Developing Chronic Cardiovascular, Neurologic, Psychiatric, and Endocrine Disorders.

open access: yesJAMA Netw Open
Mashlah A   +19 more
europepmc   +1 more source

Group collision attack

IEEE Transactions on Information Forensics and Security, 2019
Key enumeration schemes are used to post-process the scores given by side channel distinguishers and enumerate the key candidates from the most possible one to the least possible one, which can be regarded as optimal tools of key search. However, the application of them is limited by very large key candidate space and computing power consumption.
Changhai Ou   +3 more
openaire   +2 more sources

Using the Collision Attack for Breaking Cryptographic Modes

International Conference on Computing Communication and Networking Technologies, 2022
Presently the cipher system that is considered to be the industry gold standard is the Advanced Encryption Standard paired with the Cipher Block Chaining cryptographic mode (AES with CBC).
Albert H Carlson   +2 more
semanticscholar   +1 more source

Trident: A Hybrid Correlation-Collision GPU Cache Timing Attack for AES Key Recovery

International Symposium on High-Performance Computer Architecture, 2021
Given the parallel processing capabilities of Graphics Processing Units (GPUs), many applications are exploiting GPUs and cryptographic systems have also begun to leverage GPUs to accelerate encryption/decryption.
Jaeguk Ahn   +6 more
semanticscholar   +1 more source

A New Collision Attack on MD5

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, 2009
In 2005, collision resistance of several hash functions was broken by Wang et al. The strategy of determining message differential is the most important part of collision attacks against hash functions. So far, there are only three other message differentials attack published, one of which is 6 bits difference and two are 1 bit difference.
Wang Yu, Chen Jianhua, He Debiao
openaire   +1 more source

Home - About - Disclaimer - Privacy