Results 301 to 310 of about 1,678,458 (327)
Some of the next articles are maybe not open access.

An Improved Collision Attack on MD5 Algorithm

2008
The research on the attack algorithm for a MD5 collision is one of the focuses in cryptology nowadays. In this paper, by analyzing the properties of the nonlinear Boolean functions used in MD5 and the differences in term of XOR and subtraction modulo 232, we prove that some sufficient conditions presented by Jie Liang and Xuejia Lai are also necessary ...
Shiwei Chen, Chenhui Jin
openaire   +1 more source

Implementation of MD5 Collision Attack in Program

2019
Md5 [1] has been widely used because of its irreversibility, but its security is also questionable. Since Professor Wang [2] pointed out that MD5 is unsafe, Md5 collision and various attack algorithms began to appear and were used in large quantities. In the paper of Bai Honghuan’s MD5 fast collision algorithm [3], the characteristics of MD5 collision ...
Yuying Li   +4 more
openaire   +1 more source

Neurodynamics-Based Attack-Defense Guidance of Autonomous Surface Vehicles Against Multiple Attackers for Domain Protection

IEEE transactions on industrial electronics (1982. Print)
This article investigates an adversarial domain protection scenario involving multiple defending underactuated autonomous surface vehicles (ASVs) against an equal number of attacking ASVs in an obstructive environment.
Tong Kang   +5 more
semanticscholar   +1 more source

Restricted near collision attack on Plantlet

Journal of Cryptographic Engineering, 2023
Satyam Kumar   +5 more
openaire   +1 more source

Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection

2008
This paper presents algebraic collision attacks, a new powerful cryptanalytic method based on side-channel leakage which allows for low measurement counts needed for a successful key recovery in case of AES. As opposed to many other side-channel attacks, these techniques are essentially based on the internal structure of the attacked cryptographic ...
Andrey Bogdanov   +2 more
openaire   +1 more source

Efficient Collision Attack Frameworks for RIPEMD-160

IACR Cryptology ePrint Archive, 2019
F. Liu
semanticscholar   +1 more source

Earthquake — A NoC-based optimized differential cache-collision attack for MPSoCs

Design, Automation and Test in Europe, 2018
C. Reinbrecht   +3 more
semanticscholar   +1 more source

Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack

IACR Cryptology ePrint Archive, 2018
A. Wiemers, Dominik Klein
semanticscholar   +1 more source

Mitigating stealthy collision attack in energy harvesting motivated networks

IEEE Military Communications Conference, 2017
Cong Pu   +3 more
semanticscholar   +1 more source

Group Verification Based Multiple-Differential Collision Attack

International Conference on Information, Communications and Signal Processing, 2016
Changhai Ou   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy