Results 41 to 50 of about 11,604 (291)

Improved preimage and pseudo-collision attacks on SM3 hash function

open access: yesTongxin xuebao, 2018
A preimage attack on 32-step SM3 hash function and a pseudo-collision attack on 33-step SM3 hash function respectively were shown.32-step preimage attack was based on the differential meet-in-the-middle and biclique technique,while the previously known ...
Jian ZOU, Le DONG
doaj   +2 more sources

Differential fault analysis on EMV application cryptogram

open access: yes网络与信息安全学报, 2016
The process of application cryptogram in EMV was researched and dummy bits in session key were found.Based on the session key’s dummy bits and compressive property of DES’s Sbox,much information of the application cryptogram master key was got by using ...
Qian PENG, Zeng-ju LI, Ru-hui SHI
doaj   +3 more sources

An Efficient Collision Power Attack on AES Encryption in Edge Computing

open access: yesIEEE Access, 2019
Edge computing has become a promising paradigm for the context-aware and delay-sensitive IoT data analytics. For the sake of security, some cryptographic algorithms such as AES, RSA, and so on, are employed for the encryption communication and ...
Yongchuan Niu   +3 more
doaj   +1 more source

Collision Attacks Against CAESAR Candidates

open access: yes, 2015
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook). These algorithms use secret offsets (masks derived from a whitening key) to turn a block cipher into a tweakable block cipher, following the XE or XEX construction.
Fuhr, Thomas   +2 more
openaire   +2 more sources

A Collision-Attack on AES [PDF]

open access: yes, 2004
Recently a new class of collision attacks which was originally suggested by Hans Dobbertin has been introduced. These attacks use side channel analysis to detect internal collisions and are generally not restricted to a particular cryptographic algorithm. As an example, a collision attack against DES was proposed which combines internal collisions with
Kai Schramm   +3 more
openaire   +1 more source

Search framework for neutral bits and boomerangs in SHA‐1 collision attacks

open access: yesIET Information Security, 2023
Neutral bits and boomerangs are key techniques for accelerating collision search in SHA‐1 attacks. The current acceleration techniques for SHA‐1 near‐collision attacks are reviewed and a generic search framework for neutral bits and boomerangs is ...
Degang Li, Yang Yang, Guang Zeng
doaj   +1 more source

Preimage and pseudo collision attacks on round-reduced DHA-256 hash function

open access: yesTongxin xuebao, 2013
A preimage attack on DHA-256 hash function reduced to 37-round and a pseudo collision attack on the func-tion reduced to 39-round were proposed respectively.Based on the meet-in-the-middle attack,the Biclique technique was used to improve the preimage ...
Jian ZOU   +3 more
doaj   +2 more sources

Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications

open access: yesIEEE Access, 2022
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of the data, in forensic investigation ...
Darshana Upadhyay   +3 more
doaj   +1 more source

Collision Attack on Boole

open access: yes, 2009
Boole is a hash function designed by Gregory Rose and was submitted to the NIST Hash competition. It is a stream cipher based hash function which produces digests up to 512 bits. Different variants exist, namely Boole16, Boole32 and Boole64 where the number refers to word size in bits. Boole64 is considered as the official submission.
Mendel, Florian   +2 more
openaire   +2 more sources

Covalent Organic Frameworks for Photocatalytic CO2 Reduction: Metal Integration Principles, Strategies and Functions

open access: yesAdvanced Functional Materials, EarlyView.
Covalent organic frameworks (COFs) with metals have been recognized as versatile platforms for photocatalytic CO2 reduction (CO2PRR). Herein, an overview of metal integration strategies for COFs is systematically summarized. Regulatory mechanisms and structure–activity relationships between metal integration and COF‐based CO2PRR are emphasized.
Jie He   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy