Results 311 to 320 of about 1,585,996 (337)
Some of the next articles are maybe not open access.

Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection

2008
This paper presents algebraic collision attacks, a new powerful cryptanalytic method based on side-channel leakage which allows for low measurement counts needed for a successful key recovery in case of AES. As opposed to many other side-channel attacks, these techniques are essentially based on the internal structure of the attacked cryptographic ...
Andrey Bogdanov   +2 more
openaire   +2 more sources

Bit-Free Collision: Application to APOP Attack

2009
This paper proposes a new variant of collisions on hash functions named bit-free collision , which can be applied to reduce the number of chosen challenges in password recovery attacks on hash-based challenge and response protocols, such as APOP (Authentication Post Office Protocol).
Yu Sasaki   +3 more
openaire   +2 more sources

Collision Attack on the Hamsi-256 Compression Function

2012
Hamsi-256 is a cryptographic hash functions submitted by Kucuk to the NIST SHA-3 competition in 2008. It was selected by NIST as one of the 14 round 2 candidates in 2009. Even though Hamsi-256 did not make it to the final round in 2010 it is still an interesting target for cryptanalysts.
Mario Lamberger   +2 more
openaire   +2 more sources

New Collision Attacks on Round-Reduced Keccak

2017
In this paper, we focus on collision attacks against Keccak hash function family and some of its variants. Following the framework developed by Dinur et al. at FSE 2012 where 4-round collisions were found by combining 3-round differential trails and 1-round connectors, we extend the connectors one round further hence achieve collision attacks for up to
Meicheng Liu   +4 more
openaire   +2 more sources

Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack

IACR Cryptology ePrint Archive, 2018
A. Wiemers, Dominik Klein
semanticscholar   +1 more source

Group Verification Based Multiple-Differential Collision Attack

International Conference on Information, Communications and Signal Processing, 2016
Changhai Ou   +4 more
semanticscholar   +1 more source

Insect species richness affects plant responses to multi‐herbivore attack

New Phytologist, 2021
Maite Fernández De Bobadilla   +2 more
exaly  

First-order collision attack on protected NTRU cryptosystem

Microprocessors and microsystems, 2013
Xuexin Zheng, An Wang, Wei Wei
semanticscholar   +1 more source

Byzantine Attack and Defense in Cognitive Radio Networks: A Survey

IEEE Communications Surveys and Tutorials, 2015
Guoru Ding, Qihui Wu, Yulong Zou
exaly  

Home - About - Disclaimer - Privacy