Results 61 to 70 of about 136,963 (275)
Unsupervised single-trace attacks are essential for assessing the practical security of RSA implementations, but remain particularly challenging due to their reliance on complexe pre-processing.
Dorian Llavata +4 more
doaj +1 more source
A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure
We analyze the security of RSA prime generation implemented on embedded devices by a practical power analysis attack. Unlike previous differential power analysis-based attack on primality tests of RSA prime generation exploiting the deterministic ...
Sangyub Lee +3 more
doaj +1 more source
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee +3 more
doaj +1 more source
On the Design of Secure and Fast Double Block Length Hash Functions [PDF]
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core +3 more sources
SPARC (spatio‐chimeric, plasma‐based, anisotropic, and shear‐responsive construct) that integrates myogenic and vascular microenvironments within a single construct. The dual‐modulus matrix directs aligned myotube formation and endothelial network development, enabling a vascularized muscle implant that seamlessly anastomoses with host tissue and ...
Su Hyun Jung +6 more
wiley +1 more source
Security of signed ELGamal encryption [PDF]
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core
Mechanical Stress Evolution in Polycrystalline Ge Thin Films Under MeV Ion Irradiation
Irradiation of polycrystalline Ge thin films with 1.8 MeV Au ions alters residual stress through defect generation and lattice expansion. Increasing fluence drives progressive lattice disorder and eventual amorphization. Polycrystalline Ge resists amorphization longer than crystalline Ge, as grain boundaries facilitate defect diffusion, significantly ...
Karla J. Paz Corrales +10 more
wiley +1 more source
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented.
Gao-li WANG, Yan-zhao SHEN
doaj +2 more sources
Improvement on a Masked White-Box Cryptographic Implementation
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information ...
Seungkwang Lee, Myungchul Kim
doaj +1 more source
A Symbolic Intruder Model for Hash-Collision Attacks [PDF]
In the recent years, several practical methods have been published to compute collisions on some commonly used hash functions. In this paper we present a method to take into account, at the symbolic level, that an intruder actively attacking a protocol ...
Chevalier, Yannick, Kourjieh, Mounira
core +2 more sources

