Results 31 to 40 of about 11,604 (291)

Finding Collisions against 4-Round SHA-3-384 in Practical Time

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. National Institute of Standards and Technology (NIST) in 2012 as the next generation of Secure Hash Algorithm (SHA-3).
Senyang Huang   +3 more
doaj   +1 more source

Collision Attack Framework on RIPEMD-128 [PDF]

open access: yes2020 2nd International Conference on Artificial Intelligence and Advanced Manufacture (AIAM), 2020
In the last few years, the hash functions are the very common and essential primitives implemented in lots of fields. RIPEMD-128, a member of MD-family hash function, has been found collisions on the full round. In this paper, we further analyze the property about the security against collision attack of RIPEMD-128.
Jingyu Li, Guang Zeng, Yang Yang
  +5 more sources

Optimal Collision Side-Channel Attacks [PDF]

open access: yes, 2020
Collision side-channel attacks are effective attacks against cryptographic implementations, however, optimality and efficiency of collision side-channel attacks is an open question. In this paper, we show that collision side-channel attacks can be derived using maximum likelihood principle when the distribution of the values of the leakage function is ...
Cezary Glowacz, Vincent Grosso
openaire   +1 more source

Collision Based Attacks in Practice [PDF]

open access: yes2015 Euromicro Conference on Digital System Design, 2015
Chosen-Message Simple Power Analysis, also called Collision Based Attacks (CBA), have been proposed by Fouque, Yen and Homma. These attacks aim at inducing and detecting collisions during modular operations. However, detecting collisions is a challenging task in real environments. Doing it in an automated manner is even more challenging. In this paper,
Diop, Ibrahima   +3 more
openaire   +2 more sources

Enhancing Collision Attacks [PDF]

open access: yes, 2004
Side Channel Attacks (SCA) have received a huge interest in the last 5 years. These new methods consider non-cryptographic sources of information (like timing or power consumption) in addition to traditional techniques. Consequently block ciphers must now resist a variety of SCAs, among which figures the class of “collision attacks”.
Hervé Ledig   +2 more
openaire   +1 more source

Stochastic Collision Attack

open access: yesIEEE Transactions on Information Forensics and Security, 2017
On the one hand, collision attacks have been introduced in the context of side-channel analysis for attackers who exploit repeated code with the same data without having any knowledge of the leakage model. On the other hand, stochastic attacks have been introduced to recover leakage models of internally processed intermediate secret variables.
Bruneau, Nicolas   +5 more
openaire   +3 more sources

Detection of attack behaviour of pig based on deep learning

open access: yesSystems Science & Control Engineering, 2023
Attack behaviour detection of the pig is a valid method to protect the health of pig. Due to the farm conditions and the illumination changes of the piggery, the images of the pig in the videos are often being overlapped, which lead to difficulties in ...
Yanwen Li   +3 more
doaj   +1 more source

Surface damage evolution of artillery barrel under high-temperature erosion and high-speed impact

open access: yesCase Studies in Thermal Engineering, 2023
Thermochemical erosion and mechanical wear are the primary sources of surface damage in artillery barrel chambers, severely restricting the interior ballistic characteristics and service life of the barrel weapon.
Shuli Li, Liqun Wang, Guolai Yang
doaj   +1 more source

Hypothesis Testing Based Side-Channel Collision Analysis

open access: yesIEEE Access, 2019
Side-channel collision analysis has become a research hotspot since its first publication in 2003. Compared with differential power analysis (DPA) and correlation power analysis (CPA), collision analysis does not need to know the intermediate value and ...
Dong Zheng, Xiang Jia, Meiling Zhang
doaj   +1 more source

Near Collision Side Channel Attacks [PDF]

open access: yes, 2016
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar
Barış Ege   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy