Results 51 to 60 of about 215,935 (334)
Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks [PDF]
Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy ...
arxiv +1 more source
Remote booting in a hostile world: to whom am I speaking? [Computer security] [PDF]
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders.
Christianson, B., Lomas, M.
core +1 more source
Improvement on a Masked White-Box Cryptographic Implementation
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information ...
Seungkwang Lee, Myungchul Kim
doaj +1 more source
In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function ...
Jérémy Jean
doaj +1 more source
A Meaningful MD5 Hash Collision Attack [PDF]
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core +1 more source
Determination of ADP/ATP translocase isoform ratios in malignancy and cellular senescence
The individual functions of three isoforms exchanging ADP and ATP (ADP/ATP translocases; ANTs) on the mitochondrial membrane remain unclear. We developed a method for quantitatively differentiating highly similar human ANT1, ANT2, and ANT3 using parallel reaction monitoring. This method allowed us to assess changes in translocase levels during cellular
Zuzana Liblova+18 more
wiley +1 more source
A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure
We analyze the security of RSA prime generation implemented on embedded devices by a practical power analysis attack. Unlike previous differential power analysis-based attack on primality tests of RSA prime generation exploiting the deterministic ...
Sangyub Lee+3 more
doaj +1 more source
Understanding Realistic Attacks on Airborne Collision Avoidance Systems [PDF]
Airborne collision avoidance systems provide an onboard safety net should normal air traffic control procedures fail to keep aircraft separated. These systems are widely deployed and have been constantly refined over the past three decades, usually in response to near misses or mid-air collisions.
arxiv
Risks of Offline Verify PIN on Contactless Cards [PDF]
Contactless card payments are being introduced around the world al- lowing customers to use a card to pay for small purchases by simply placing the card onto the Point of Sale terminal.
Arief, Budi+3 more
core +1 more source
Near Collision Side Channel Attacks [PDF]
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar
Lejla Batina+2 more
openaire +2 more sources