Results 21 to 30 of about 211,629 (261)

Fixed Point Attack in PGV-5 Scheme Using SIMON Algorithm [PDF]

open access: yes, 2015
Block cipher-based hash function is a hash function that is constructed by applying a block cipher algorithm on a scheme to form a hash algorithm. So that the strength of the block cipher-based hash function depends on the strength of a block cipher ...
Risqi, Y.S. Sofu   +2 more
core   +1 more source

Multimodal Locomotion: Next Generation Aerial–Terrestrial Mobile Robotics

open access: yesAdvanced Intelligent Systems, EarlyView., 2023
Aerial–terrestrial robots can achieve efficient energy consumption and robust environmental interaction by adding morphological features, adapting forms for locomotion transitions, and integrating multiple platforms. This next generation of mobile robots advances real‐world robotic deployment for operations with complex tasks and tackle environments ...
Jane Pauline Ramirez, Salua Hamaza
wiley   +1 more source

Selective Synthesis of Oligosaccharides by Mechanochemical Hydrolysis of Chitin over a Carbon‐Based Catalyst

open access: yesAngewandte Chemie, Volume 135, Issue 3, January 16, 2023., 2023
An activated carbon catalyst having weak acid sites hydrolyzes chitin to chitin‐oligosaccharides selectively in the presence of mechanical milling. Our system preferentially cleaves large molecules over small oligomers, thus maximizing the selectivity and yield of chitin‐oligosaccharides.
Hirokazu Kobayashi   +4 more
wiley   +2 more sources

Search framework for neutral bits and boomerangs in SHA‐1 collision attacks

open access: yesIET Information Security, 2023
Neutral bits and boomerangs are key techniques for accelerating collision search in SHA‐1 attacks. The current acceleration techniques for SHA‐1 near‐collision attacks are reviewed and a generic search framework for neutral bits and boomerangs is ...
Degang Li, Yang Yang, Guang Zeng
doaj   +1 more source

(Quantum) Collision Attacks on Reduced Simpira v2

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Simpira v2 is an AES-based permutation proposed by Gueron and Mouha at ASIACRYPT 2016. In this paper, we build an improved MILP model to count the differential and linear active Sboxes for Simpira v2, which achieves tighter bounds of the minimum number ...
Boyu Ni   +3 more
doaj   +1 more source

Hypothesis Testing Based Side-Channel Collision Analysis

open access: yesIEEE Access, 2019
Side-channel collision analysis has become a research hotspot since its first publication in 2003. Compared with differential power analysis (DPA) and correlation power analysis (CPA), collision analysis does not need to know the intermediate value and ...
Dong Zheng, Xiang Jia, Meiling Zhang
doaj   +1 more source

Improved preimage and pseudo-collision attacks on SM3 hash function

open access: yesTongxin xuebao, 2018
A preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown.32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known ...
Jian ZOU, Le DONG
doaj   +2 more sources

An Efficient Collision Power Attack on AES Encryption in Edge Computing

open access: yesIEEE Access, 2019
Edge computing has become a promising paradigm for the context-aware and delay-sensitive IoT data analytics. For the sake of security, some cryptographic algorithms such as AES, RSA, and so on, are employed for the encryption communication and ...
Yongchuan Niu   +3 more
doaj   +1 more source

Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications

open access: yesIEEE Access, 2022
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of the data, in forensic investigation ...
Darshana Upadhyay   +3 more
doaj   +1 more source

IDCAIS: Inter-Defender Collision-Aware Interception Strategy against Multiple Attackers [PDF]

open access: yesarXiv, 2021
In the prior literature on multi-agent area defense games, the assignments of the defenders to the attackers are done based on a cost metric associated only with the interception of the attackers. In contrast to that, this paper presents an Inter-Defender Collision-Aware Interception Strategy (IDCAIS) for defenders to intercept attackers in order to ...
arxiv  

Home - About - Disclaimer - Privacy