Results 301 to 310 of about 1,678,458 (327)
Some of the next articles are maybe not open access.
An Improved Collision Attack on MD5 Algorithm
2008The research on the attack algorithm for a MD5 collision is one of the focuses in cryptology nowadays. In this paper, by analyzing the properties of the nonlinear Boolean functions used in MD5 and the differences in term of XOR and subtraction modulo 232, we prove that some sufficient conditions presented by Jie Liang and Xuejia Lai are also necessary ...
Shiwei Chen, Chenhui Jin
openaire +1 more source
Implementation of MD5 Collision Attack in Program
2019Md5 [1] has been widely used because of its irreversibility, but its security is also questionable. Since Professor Wang [2] pointed out that MD5 is unsafe, Md5 collision and various attack algorithms began to appear and were used in large quantities. In the paper of Bai Honghuan’s MD5 fast collision algorithm [3], the characteristics of MD5 collision ...
Yuying Li +4 more
openaire +1 more source
IEEE transactions on industrial electronics (1982. Print)
This article investigates an adversarial domain protection scenario involving multiple defending underactuated autonomous surface vehicles (ASVs) against an equal number of attacking ASVs in an obstructive environment.
Tong Kang +5 more
semanticscholar +1 more source
This article investigates an adversarial domain protection scenario involving multiple defending underactuated autonomous surface vehicles (ASVs) against an equal number of attacking ASVs in an obstructive environment.
Tong Kang +5 more
semanticscholar +1 more source
Restricted near collision attack on Plantlet
Journal of Cryptographic Engineering, 2023Satyam Kumar +5 more
openaire +1 more source
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
2008This paper presents algebraic collision attacks, a new powerful cryptanalytic method based on side-channel leakage which allows for low measurement counts needed for a successful key recovery in case of AES. As opposed to many other side-channel attacks, these techniques are essentially based on the internal structure of the attacked cryptographic ...
Andrey Bogdanov +2 more
openaire +1 more source
Efficient Collision Attack Frameworks for RIPEMD-160
IACR Cryptology ePrint Archive, 2019F. Liu
semanticscholar +1 more source
Earthquake — A NoC-based optimized differential cache-collision attack for MPSoCs
Design, Automation and Test in Europe, 2018C. Reinbrecht +3 more
semanticscholar +1 more source
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
IACR Cryptology ePrint Archive, 2018A. Wiemers, Dominik Klein
semanticscholar +1 more source
Mitigating stealthy collision attack in energy harvesting motivated networks
IEEE Military Communications Conference, 2017Cong Pu +3 more
semanticscholar +1 more source
Group Verification Based Multiple-Differential Collision Attack
International Conference on Information, Communications and Signal Processing, 2016Changhai Ou +4 more
semanticscholar +1 more source

