Results 21 to 30 of about 1,691,785 (320)

(Quantum) Collision Attacks on Reduced Simpira v2

open access: diamondIACR Transactions on Symmetric Cryptology, 2021
Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016. In this paper, we build an improved MILP model to count the differential and linear active Sboxes for Simpira v2, which achieves tighter bounds of the minimum number ...
Boyu Ni   +3 more
doaj   +3 more sources

Improved 2-round collision attack on IoT hash standard ASCON-HASH [PDF]

open access: yesHeliyon
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai   +4 more
doaj   +2 more sources

Collision Attack on Boole [PDF]

open access: bronze, 2009
Boole is a hash function designed by Gregory Rose and was submitted to the NIST Hash competition. It is a stream cipher based hash function which produces digests up to 512 bits. Different variants exist, namely Boole16, Boole32 and Boole64 where the number refers to word size in bits. Boole64 is considered as the official submission.
Florian Mendel   +2 more
openalex   +3 more sources

A Collision-Attack on AES: Combining Side Channel- and Differential-Attack [PDF]

open access: yesWorkshop on Cryptographic Hardware and Embedded Systems, 2004
Recently a new class of collision attacks which was originally suggested by Hans Dobbertin has been introduced. These attacks use side channel analysis to detect internal collisions and are generally not restricted to a particular cryptographic algorithm. As an example, a collision attack against DES was proposed which combines internal collisions with
Kai Schramm   +3 more
semanticscholar   +2 more sources

Optimizing Fast Near Collision Attack on Grain Using Linear Programming [PDF]

open access: goldIEEE Access, 2019
In 2018, an attack named fast-near-collision attack (FNCA) was proposed, which is an improved version of near-collision attack (NCA) on Grain-v1, one of the three hardware-oriented finalists of the eSTREAM project.
Senshan Pan, Yueping Wu, Liangmin Wang
doaj   +2 more sources

Collision Attacks on Reduced RIPEMD-128

open access: yesIACR Transactions on Symmetric Cryptology
RIPEMD-128 is an ISO/IEC standard hash function based on a doublebranch Merkle-Damgård structure. Its compression function includes two branches with distinct Boolean functions and message expansion permutations.
Zhengrong Lu   +3 more
doaj   +3 more sources

Double Sieve Collision Attack Based on Bitwise Detection [PDF]

open access: bronzeKSII Transactions on Internet and Information Systems, 2015
Yanting Ren, Liji Wu
openalex   +2 more sources

Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis [PDF]

open access: goldJournal of Applied Mathematics, 2013
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
Jinkeon Kang   +4 more
doaj   +2 more sources

Horizontal Collision Correlation Attack on Elliptic Curves [PDF]

open access: bronze, 2014
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of providing efficient implementations with short certificates and of being relatively easy to secure against side-channel attacks.
Aurélie Bauer   +3 more
openalex   +3 more sources

SHA-256 Collision Attack with Programmatic SAT

open access: yesPAAR+SC²@IJCAR
Cryptographic hash functions play a crucial role in ensuring data security, generating fixed-length hashes from variable-length inputs. The hash function SHA-256 is trusted for data security due to its resilience after over twenty years of intense ...
Nahiyan Alamgir   +2 more
semanticscholar   +3 more sources

Home - About - Disclaimer - Privacy