Results 31 to 40 of about 133,184 (295)

Quantum Tokens for Digital Signatures [PDF]

open access: yes, 2023
The fisherman caught a quantum fish. "Fisherman, please let me go", begged the fish, "and I will grant you three wishes". The fisherman agreed. The fish gave the fisherman a quantum computer, three quantum signing tokens and his classical public key. The
Ben-David, Shalev, Sattath, Or
core   +2 more sources

Surface damage evolution of artillery barrel under high-temperature erosion and high-speed impact

open access: yesCase Studies in Thermal Engineering, 2023
Thermochemical erosion and mechanical wear are the primary sources of surface damage in artillery barrel chambers, severely restricting the interior ballistic characteristics and service life of the barrel weapon.
Shuli Li, Liqun Wang, Guolai Yang
doaj   +1 more source

Enhancing Collision Attacks [PDF]

open access: yes, 2004
Side Channel Attacks (SCA) have received a huge interest in the last 5 years. These new methods consider non-cryptographic sources of information (like timing or power consumption) in addition to traditional techniques. Consequently block ciphers must now resist a variety of SCAs, among which figures the class of “collision attacks”.
Frédéric Muller   +2 more
openaire   +2 more sources

Preimage and Collision Attacks on MD2 [PDF]

open access: yes, 2005
This paper contains several attacks on the hash function MD2 which has a hash code size of 128 bits. At Asiacrypt 2004 Muller presents the first known preimage attack on MD2. The time complexity of the attack is about 2104 and the preimages consist always of 128 blocks.
John Erik Mathiassen, Lars R. Knudsen
openaire   +1 more source

A Collision-Attack on AES [PDF]

open access: yes, 2004
Recently a new class of collision attacks which was originally suggested by Hans Dobbertin has been introduced. These attacks use side channel analysis to detect internal collisions and are generally not restricted to a particular cryptographic algorithm. As an example, a collision attack against DES was proposed which combines internal collisions with
Gregor Leander   +3 more
openaire   +2 more sources

Remote booting in a hostile world: to whom am I speaking? [Computer security] [PDF]

open access: yes, 1995
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders.
Christianson, B., Lomas, M.
core   +1 more source

Hypothesis Testing Based Side-Channel Collision Analysis

open access: yesIEEE Access, 2019
Side-channel collision analysis has become a research hotspot since its first publication in 2003. Compared with differential power analysis (DPA) and correlation power analysis (CPA), collision analysis does not need to know the intermediate value and ...
Dong Zheng, Xiang Jia, Meiling Zhang
doaj   +1 more source

Instruction-Fetching Attack and Practice in Collision Fault Attack on AES

open access: yesSymmetry, 2022
A Fault Attack (FA) is performed mainly under the data corruption model and poses a threat to security chips. Instruction corruption can enact the same purpose at the behavioral level, which is produced by interfering with the instruction system. Laser Fault Injection (LFI) on program memory during the instruction-fetching process, which we refer to as
Huilong Jiang, Xiang Zhu, Jianwei Han
openaire   +1 more source

Security of differential phase shift quantum key distribution against individual attacks [PDF]

open access: yes, 2005
We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks.
C. Bennett   +4 more
core   +1 more source

Collision Attack on Boole

open access: yes, 2009
Boole is a hash function designed by Gregory Rose and was submitted to the NIST Hash competition. It is a stream cipher based hash function which produces digests up to 512 bits. Different variants exist, namely Boole16, Boole32 and Boole64 where the number refers to word size in bits. Boole64 is considered as the official submission.
Mendel, Florian   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy