Results 21 to 30 of about 1,691,785 (320)
(Quantum) Collision Attacks on Reduced Simpira v2
Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016. In this paper, we build an improved MILP model to count the differential and linear active Sboxes for Simpira v2, which achieves tighter bounds of the minimum number ...
Boyu Ni +3 more
doaj +3 more sources
Improved 2-round collision attack on IoT hash standard ASCON-HASH [PDF]
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for ...
Di Zhai +4 more
doaj +2 more sources
Collision Attack on Boole [PDF]
Boole is a hash function designed by Gregory Rose and was submitted to the NIST Hash competition. It is a stream cipher based hash function which produces digests up to 512 bits. Different variants exist, namely Boole16, Boole32 and Boole64 where the number refers to word size in bits. Boole64 is considered as the official submission.
Florian Mendel +2 more
openalex +3 more sources
A Collision-Attack on AES: Combining Side Channel- and Differential-Attack [PDF]
Recently a new class of collision attacks which was originally suggested by Hans Dobbertin has been introduced. These attacks use side channel analysis to detect internal collisions and are generally not restricted to a particular cryptographic algorithm. As an example, a collision attack against DES was proposed which combines internal collisions with
Kai Schramm +3 more
semanticscholar +2 more sources
Optimizing Fast Near Collision Attack on Grain Using Linear Programming [PDF]
In 2018, an attack named fast-near-collision attack (FNCA) was proposed, which is an improved version of near-collision attack (NCA) on Grain-v1, one of the three hardware-oriented finalists of the eSTREAM project.
Senshan Pan, Yueping Wu, Liangmin Wang
doaj +2 more sources
Collision Attacks on Reduced RIPEMD-128
RIPEMD-128 is an ISO/IEC standard hash function based on a doublebranch Merkle-Damgård structure. Its compression function includes two branches with distinct Boolean functions and message expansion permutations.
Zhengrong Lu +3 more
doaj +3 more sources
Double Sieve Collision Attack Based on Bitwise Detection [PDF]
Yanting Ren, Liji Wu
openalex +2 more sources
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis [PDF]
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
Jinkeon Kang +4 more
doaj +2 more sources
Horizontal Collision Correlation Attack on Elliptic Curves [PDF]
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of providing efficient implementations with short certificates and of being relatively easy to secure against side-channel attacks.
Aurélie Bauer +3 more
openalex +3 more sources
SHA-256 Collision Attack with Programmatic SAT
Cryptographic hash functions play a crucial role in ensuring data security, generating fixed-length hashes from variable-length inputs. The hash function SHA-256 is trusted for data security due to its resilience after over twenty years of intense ...
Nahiyan Alamgir +2 more
semanticscholar +3 more sources

