Results 31 to 40 of about 215,935 (334)
Collision Based Attacks in Practice [PDF]
Chosen-Message Simple Power Analysis, also called Collision Based Attacks (CBA), have been proposed by Fouque, Yen and Homma. These attacks aim at inducing and detecting collisions during modular operations. However, detecting collisions is a challenging task in real environments. Doing it in an automated manner is even more challenging. In this paper,
Diop, Ibrahima+3 more
openaire +4 more sources
Finding Collisions against 4-Round SHA-3-384 in Practical Time
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. National Institute of Standards and Technology (NIST) in 2012 as the next generation of Secure Hash Algorithm (SHA-3).
Senyang Huang+3 more
doaj +1 more source
Optimal Collision Side-Channel Attacks [PDF]
Collision side-channel attacks are effective attacks against cryptographic implementations, however, optimality and efficiency of collision side-channel attacks is an open question. In this paper, we show that collision side-channel attacks can be derived using maximum likelihood principle when the distribution of the values of the leakage function is ...
Glowacz, Cezary, Grosso, Vincent
openaire +3 more sources
Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware [PDF]
In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting the Middle-East. As it turned out, it used a forged signature to infect Windows machines by MITM-ing Windows Update.
Fillinger, M.J. (Max)+1 more
core +4 more sources
Detection of attack behaviour of pig based on deep learning
Attack behaviour detection of the pig is a valid method to protect the health of pig. Due to the farm conditions and the illumination changes of the piggery, the images of the pig in the videos are often being overlapped, which lead to difficulties in ...
Yanwen Li+3 more
doaj +1 more source
Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack [PDF]
The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric ...
Daisuke SUZUKI+2 more
core +2 more sources
Collision Attack on Boole [PDF]
Boole is a hash function designed by Gregory Rose and was submitted to the NIST Hash competition. It is a stream cipher based hash function which produces digests up to 512 bits. Different variants exist, namely Boole16, Boole32 and Boole64 where the number refers to word size in bits. Boole64 is considered as the official submission.
Mendel, Florian+2 more
openaire +2 more sources
Differential fault analysis on EMV application cryptogram
The process of application cryptogram in EMV was researched and dummy bits in session key were found.Based on the session key’s dummy bits and compressive property of DES’s Sbox,much information of the application cryptogram master key was got by using ...
Qian PENG, Zeng-ju LI, Ru-hui SHI
doaj +3 more sources
Preimage and Collision Attacks on MD2 [PDF]
This paper contains several attacks on the hash function MD2 which has a hash code size of 128 bits. At Asiacrypt 2004 Muller presents the first known preimage attack on MD2. The time complexity of the attack is about 2104 and the preimages consist always of 128 blocks.
John Erik Mathiassen, Lars R. Knudsen
openaire +1 more source
Fixed Point Attack in PGV-5 Scheme Using SIMON Algorithm [PDF]
Block cipher-based hash function is a hash function that is constructed by applying a block cipher algorithm on a scheme to form a hash algorithm. So that the strength of the block cipher-based hash function depends on the strength of a block cipher ...
Risqi, Y.S. Sofu+2 more
core +1 more source