Results 31 to 40 of about 215,935 (334)

Collision Based Attacks in Practice [PDF]

open access: yes2015 Euromicro Conference on Digital System Design, 2015
Chosen-Message Simple Power Analysis, also called Collision Based Attacks (CBA), have been proposed by Fouque, Yen and Homma. These attacks aim at inducing and detecting collisions during modular operations. However, detecting collisions is a challenging task in real environments. Doing it in an automated manner is even more challenging. In this paper,
Diop, Ibrahima   +3 more
openaire   +4 more sources

Finding Collisions against 4-Round SHA-3-384 in Practical Time

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. National Institute of Standards and Technology (NIST) in 2012 as the next generation of Secure Hash Algorithm (SHA-3).
Senyang Huang   +3 more
doaj   +1 more source

Optimal Collision Side-Channel Attacks [PDF]

open access: yes, 2020
Collision side-channel attacks are effective attacks against cryptographic implementations, however, optimality and efficiency of collision side-channel attacks is an open question. In this paper, we show that collision side-channel attacks can be derived using maximum likelihood principle when the distribution of the values of the leakage function is ...
Glowacz, Cezary, Grosso, Vincent
openaire   +3 more sources

Reverse-Engineering of the Cryptanalytic Attack Used in the Flame Super-Malware [PDF]

open access: yes, 2015
In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting the Middle-East. As it turned out, it used a forged signature to infect Windows machines by MITM-ing Windows Update.
Fillinger, M.J. (Max)   +1 more
core   +4 more sources

Detection of attack behaviour of pig based on deep learning

open access: yesSystems Science & Control Engineering, 2023
Attack behaviour detection of the pig is a valid method to protect the health of pig. Due to the farm conditions and the illumination changes of the piggery, the images of the pig in the videos are often being overlapped, which lead to difficulties in ...
Yanwen Li   +3 more
doaj   +1 more source

Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack [PDF]

open access: yes, 2016
The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric ...
Daisuke SUZUKI   +2 more
core   +2 more sources

Collision Attack on Boole [PDF]

open access: yes, 2009
Boole is a hash function designed by Gregory Rose and was submitted to the NIST Hash competition. It is a stream cipher based hash function which produces digests up to 512 bits. Different variants exist, namely Boole16, Boole32 and Boole64 where the number refers to word size in bits. Boole64 is considered as the official submission.
Mendel, Florian   +2 more
openaire   +2 more sources

Differential fault analysis on EMV application cryptogram

open access: yes网络与信息安全学报, 2016
The process of application cryptogram in EMV was researched and dummy bits in session key were found.Based on the session key’s dummy bits and compressive property of DES’s Sbox,much information of the application cryptogram master key was got by using ...
Qian PENG, Zeng-ju LI, Ru-hui SHI
doaj   +3 more sources

Preimage and Collision Attacks on MD2 [PDF]

open access: yes, 2005
This paper contains several attacks on the hash function MD2 which has a hash code size of 128 bits. At Asiacrypt 2004 Muller presents the first known preimage attack on MD2. The time complexity of the attack is about 2104 and the preimages consist always of 128 blocks.
John Erik Mathiassen, Lars R. Knudsen
openaire   +1 more source

Fixed Point Attack in PGV-5 Scheme Using SIMON Algorithm [PDF]

open access: yes, 2015
Block cipher-based hash function is a hash function that is constructed by applying a block cipher algorithm on a scheme to form a hash algorithm. So that the strength of the block cipher-based hash function depends on the strength of a block cipher ...
Risqi, Y.S. Sofu   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy