Results 321 to 330 of about 1,585,996 (337)
Some of the next articles are maybe not open access.

Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2

Fast Software Encryption Workshop, 2012
Ji Li, Takanori Isobe, Kyoji Shibutani
semanticscholar   +1 more source

Observer‐based attack‐resilient control for linear systems against FDI attacks on communication links from controller to actuators

International Journal of Robust and Nonlinear Control, 2018
Chun-hua Xie, Guang-hong Yang
exaly  

Right or wrong collision rate analysis without profiling: full-automatic collision fault attack

Science China Information Sciences, 2017
An Wang   +5 more
semanticscholar   +1 more source

Correlation-Enhanced Power Analysis Collision Attack

Workshop on Cryptographic Hardware and Embedded Systems, 2010
A. Moradi, Oliver Mischke, T. Eisenbarth
semanticscholar   +1 more source

RAD‐EI: A routing attack detection scheme for edge‐based Internet of Things environment

International Journal of Communication Systems, 2019
Ashok Kumar Das   +2 more
exaly  

A Meet-in-the-Middle Collision Attack Against the New FORK-256

IACR Cryptology ePrint Archive, 2007
Markku-Juhani O. Saarinen
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy