Results 51 to 60 of about 215,935 (334)

Attack Prevention for Collaborative Spectrum Sensing in Cognitive Radio Networks [PDF]

open access: yes, 2011
Collaborative spectrum sensing can significantly improve the detection performance of secondary unlicensed users (SUs). However, the performance of collaborative sensing is vulnerable to sensing data falsification attacks, where malicious SUs (attackers) submit manipulated sensing reports to mislead the fusion center's decision on spectrum occupancy ...
arxiv   +1 more source

Remote booting in a hostile world: to whom am I speaking? [Computer security] [PDF]

open access: yes, 2002
“This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders.
Christianson, B., Lomas, M.
core   +1 more source

Improvement on a Masked White-Box Cryptographic Implementation

open access: yesIEEE Access, 2020
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information ...
Seungkwang Lee, Myungchul Kim
doaj   +1 more source

Cryptanalysis of Haraka

open access: yesIACR Transactions on Symmetric Cryptology, 2016
In this paper, we describe attacks on the recently proposed Haraka hash functions. First, for the two hash functions Haraka-256/256 and Haraka-512/256 in the family, we show how two colliding messages can be constructed in about 216 function ...
Jérémy Jean
doaj   +1 more source

A Meaningful MD5 Hash Collision Attack [PDF]

open access: yes, 2006
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core   +1 more source

Determination of ADP/ATP translocase isoform ratios in malignancy and cellular senescence

open access: yesMolecular Oncology, EarlyView.
The individual functions of three isoforms exchanging ADP and ATP (ADP/ATP translocases; ANTs) on the mitochondrial membrane remain unclear. We developed a method for quantitatively differentiating highly similar human ANT1, ANT2, and ANT3 using parallel reaction monitoring. This method allowed us to assess changes in translocase levels during cellular
Zuzana Liblova   +18 more
wiley   +1 more source

A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

open access: yesIEEE Access, 2019
We analyze the security of RSA prime generation implemented on embedded devices by a practical power analysis attack. Unlike previous differential power analysis-based attack on primality tests of RSA prime generation exploiting the deterministic ...
Sangyub Lee   +3 more
doaj   +1 more source

Understanding Realistic Attacks on Airborne Collision Avoidance Systems [PDF]

open access: yesarXiv, 2020
Airborne collision avoidance systems provide an onboard safety net should normal air traffic control procedures fail to keep aircraft separated. These systems are widely deployed and have been constantly refined over the past three decades, usually in response to near misses or mid-air collisions.
arxiv  

Risks of Offline Verify PIN on Contactless Cards [PDF]

open access: yes, 2013
Contactless card payments are being introduced around the world al- lowing customers to use a card to pay for small purchases by simply placing the card onto the Point of Sale terminal.
Arief, Budi   +3 more
core   +1 more source

Near Collision Side Channel Attacks [PDF]

open access: yes, 2016
Side channel collision attacks are a powerful method to exploit side channel leakage. Otherwise than a few exceptions, collision attacks usually combine leakage from distinct points in time, making them inherently bivariate. This work introduces the notion of near collisions to exploit the fact that values depending on the same sub-key can have similar
Lejla Batina   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy