Results 31 to 40 of about 211,629 (261)

Practical free-start collision attacks on 76-step SHA-1 [PDF]

open access: yes, 2015
In this paper we analyze the security of the compression function of SHA-1 against collision attacks, or equivalently free-start collisions on the hash function.
A Joux   +20 more
core   +3 more sources

Evaluation of the characteristics of workers injured on the job requiring hospitalization, and employer compliance with OSHA's reporting requirement for these work‐related hospitalizations

open access: yesAmerican Journal of Industrial Medicine, Volume 66, Issue 2, Page 109-121, February 2023., 2023
Abstract Background The Occupational Safety and Health Administration (OSHA) implemented a new standard in 2014 requiring employers to report nearly all work‐related inpatient hospitalizations within 24 h of the event. We examined the characteristics of the injured workers who were reported and the compliance of Michigan employers with the regulation ...
Mary Jo Reilly   +2 more
wiley   +1 more source

Preimage and pseudo collision attacks on round-reduced DHA-256 hash function

open access: yesTongxin xuebao, 2013
A preimage attack on DHA-256 hash function reduced to 37-round and a pseudo collision attack on the func-tion reduced to 39-round were proposed respectively.Based on the meet-in-the-middle attack,the Biclique technique was used to improve the preimage ...
Jian ZOU   +3 more
doaj   +2 more sources

Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks [PDF]

open access: yes, 2011
Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy ...
arxiv   +1 more source

On the Design of Secure and Fast Double Block Length Hash Functions [PDF]

open access: yes, 2008
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core   +7 more sources

A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

open access: yesIEEE Access, 2019
We analyze the security of RSA prime generation implemented on embedded devices by a practical power analysis attack. Unlike previous differential power analysis-based attack on primality tests of RSA prime generation exploiting the deterministic ...
Sangyub Lee   +3 more
doaj   +1 more source

A Meaningful MD5 Hash Collision Attack [PDF]

open access: yes, 2006
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core   +1 more source

Incidence of and Risk of Mortality After Hip Fractures in Rheumatoid Arthritis Relative to the General Population

open access: yesArthritis Care &Research, EarlyView.
Objective Osteoporosis, a known complication of rheumatoid arthritis (RA), increases the risk of hip fracture, which is associated with high morbidity and mortality. Fracture risk estimates in patients with RA treated with contemporary treatment strategies are lacking.
C. Allyson Jones   +5 more
wiley   +1 more source

Cryptanalysis of Haraka

open access: yesIACR Transactions on Symmetric Cryptology, 2016
In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function ...
Jérémy Jean
doaj   +1 more source

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

open access: yesIEEE Access, 2020
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy