Results 31 to 40 of about 1,678,458 (327)

Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
In this paper, we propose a novel key recovery attack against secure ECDSA signature generation employing regular table-based scalar multiplication.
Sunghyun Jin   +4 more
doaj   +1 more source

Collision Based Attacks in Practice [PDF]

open access: yes2015 Euromicro Conference on Digital System Design, 2015
Chosen-Message Simple Power Analysis, also called Collision Based Attacks (CBA), have been proposed by Fouque, Yen and Homma. These attacks aim at inducing and detecting collisions during modular operations. However, detecting collisions is a challenging task in real environments. Doing it in an automated manner is even more challenging. In this paper,
Diop, Ibrahima   +3 more
openaire   +2 more sources

Quantum Tokens for Digital Signatures [PDF]

open access: yes, 2023
The fisherman caught a quantum fish. "Fisherman, please let me go", begged the fish, "and I will grant you three wishes". The fisherman agreed. The fish gave the fisherman a quantum computer, three quantum signing tokens and his classical public key. The
Ben-David, Shalev, Sattath, Or
core   +2 more sources

Two Improved Multiple‐Differential Collision Attacks [PDF]

open access: yesMathematical Problems in Engineering, 2014
In CHES 2008, Bogdanov proposed multiple‐differential collision attacks which could be applied to the power analysis attacks on practical cryptographic systems. However, due to the effect of countermeasures on FPGA, there are some difficulties during the collision detection, such as local high noise and the lack of sampling points.
An Wang   +5 more
openaire   +2 more sources

Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack [PDF]

open access: yes, 2016
The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric ...
Daisuke SUZUKI   +2 more
core   +2 more sources

Stuck in Traffic (SiT) Attacks: A Framework for Identifying Stealthy Attacks that Cause Traffic Congestion [PDF]

open access: yes, 2012
Recent advances in wireless technologies have enabled many new applications in Intelligent Transportation Systems (ITS) such as collision avoidance, cooperative driving, congestion avoidance, and traffic optimization.
Atia, George, Guirguis, Mina
core   +2 more sources

Parallel algorithm for MD5 collision attack

open access: diamondProgram Systems: Theory and Applications, 2015
Anton A. Kuznetsov
openalex   +2 more sources

Enhancing Collision Attacks [PDF]

open access: yes, 2004
Side Channel Attacks (SCA) have received a huge interest in the last 5 years. These new methods consider non-cryptographic sources of information (like timing or power consumption) in addition to traditional techniques. Consequently block ciphers must now resist a variety of SCAs, among which figures the class of “collision attacks”.
Hervé Ledig   +2 more
openaire   +1 more source

Detection of attack behaviour of pig based on deep learning

open access: yesSystems Science & Control Engineering, 2023
Attack behaviour detection of the pig is a valid method to protect the health of pig. Due to the farm conditions and the illumination changes of the piggery, the images of the pig in the videos are often being overlapped, which lead to difficulties in ...
Yanwen Li   +3 more
doaj   +1 more source

Surface damage evolution of artillery barrel under high-temperature erosion and high-speed impact

open access: yesCase Studies in Thermal Engineering, 2023
Thermochemical erosion and mechanical wear are the primary sources of surface damage in artillery barrel chambers, severely restricting the interior ballistic characteristics and service life of the barrel weapon.
Shuli Li, Liqun Wang, Guolai Yang
doaj   +1 more source

Home - About - Disclaimer - Privacy