Results 31 to 40 of about 211,629 (261)
Practical free-start collision attacks on 76-step SHA-1 [PDF]
In this paper we analyze the security of the compression function of SHA-1 against collision attacks, or equivalently free-start collisions on the hash function.
A Joux+20 more
core +3 more sources
Abstract Background The Occupational Safety and Health Administration (OSHA) implemented a new standard in 2014 requiring employers to report nearly all work‐related inpatient hospitalizations within 24 h of the event. We examined the characteristics of the injured workers who were reported and the compliance of Michigan employers with the regulation ...
Mary Jo Reilly+2 more
wiley +1 more source
Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
A preimage attack on DHA-256 hash function reduced to 37-round and a pseudo collision attack on the func-tion reduced to 39-round were proposed respectively.Based on the meet-in-the-middle attack,the Biclique technique was used to improve the preimage ...
Jian ZOU+3 more
doaj +2 more sources
Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks [PDF]
Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy ...
arxiv +1 more source
On the Design of Secure and Fast Double Block Length Hash Functions [PDF]
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core +7 more sources
A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure
We analyze the security of RSA prime generation implemented on embedded devices by a practical power analysis attack. Unlike previous differential power analysis-based attack on primality tests of RSA prime generation exploiting the deterministic ...
Sangyub Lee+3 more
doaj +1 more source
A Meaningful MD5 Hash Collision Attack [PDF]
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core +1 more source
Objective Osteoporosis, a known complication of rheumatoid arthritis (RA), increases the risk of hip fracture, which is associated with high morbidity and mortality. Fracture risk estimates in patients with RA treated with contemporary treatment strategies are lacking.
C. Allyson Jones+5 more
wiley +1 more source
In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function ...
Jérémy Jean
doaj +1 more source
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee+3 more
doaj +1 more source