Results 311 to 320 of about 1,585,996 (337)
Some of the next articles are maybe not open access.
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
2008This paper presents algebraic collision attacks, a new powerful cryptanalytic method based on side-channel leakage which allows for low measurement counts needed for a successful key recovery in case of AES. As opposed to many other side-channel attacks, these techniques are essentially based on the internal structure of the attacked cryptographic ...
Andrey Bogdanov+2 more
openaire +2 more sources
Bit-Free Collision: Application to APOP Attack
2009This paper proposes a new variant of collisions on hash functions named bit-free collision , which can be applied to reduce the number of chosen challenges in password recovery attacks on hash-based challenge and response protocols, such as APOP (Authentication Post Office Protocol).
Yu Sasaki+3 more
openaire +2 more sources
Collision Attack on the Hamsi-256 Compression Function
2012Hamsi-256 is a cryptographic hash functions submitted by Kucuk to the NIST SHA-3 competition in 2008. It was selected by NIST as one of the 14 round 2 candidates in 2009. Even though Hamsi-256 did not make it to the final round in 2010 it is still an interesting target for cryptanalysts.
Mario Lamberger+2 more
openaire +2 more sources
New Collision Attacks on Round-Reduced Keccak
2017In this paper, we focus on collision attacks against Keccak hash function family and some of its variants. Following the framework developed by Dinur et al. at FSE 2012 where 4-round collisions were found by combining 3-round differential trails and 1-round connectors, we extend the connectors one round further hence achieve collision attacks for up to
Meicheng Liu+4 more
openaire +2 more sources
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
IACR Cryptology ePrint Archive, 2018A. Wiemers, Dominik Klein
semanticscholar +1 more source
Group Verification Based Multiple-Differential Collision Attack
International Conference on Information, Communications and Signal Processing, 2016Changhai Ou+4 more
semanticscholar +1 more source
Insect species richness affects plant responses to multi‐herbivore attack
New Phytologist, 2021Maite Fernández De Bobadilla+2 more
exaly
First-order collision attack on protected NTRU cryptosystem
Microprocessors and microsystems, 2013Xuexin Zheng, An Wang, Wei Wei
semanticscholar +1 more source
Byzantine Attack and Defense in Cognitive Radio Networks: A Survey
IEEE Communications Surveys and Tutorials, 2015Guoru Ding, Qihui Wu, Yulong Zou
exaly