Results 61 to 70 of about 136,963 (275)

BTCCA: Unsupervised Horizontal Attack against RSA Primitive with Barlow Twins Collision Correlation Analysis

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Unsupervised single-trace attacks are essential for assessing the practical security of RSA implementations, but remain particularly challenging due to their reliance on complexe pre-processing.
Dorian Llavata   +4 more
doaj   +1 more source

A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

open access: yesIEEE Access, 2019
We analyze the security of RSA prime generation implemented on embedded devices by a practical power analysis attack. Unlike previous differential power analysis-based attack on primality tests of RSA prime generation exploiting the deterministic ...
Sangyub Lee   +3 more
doaj   +1 more source

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

open access: yesIEEE Access, 2020
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat on elliptic curve cryptosystems recently as their practical experimental results are increasingly reported ...
Sangyub Lee   +3 more
doaj   +1 more source

On the Design of Secure and Fast Double Block Length Hash Functions [PDF]

open access: yes, 2008
In this work the security of the rate-1 double block length hash functions, which based on a block cipher with a block length of n-bit and a key length of 2n-bit, is reconsidered.
Chen, Kefei, Gong, Z., Lai, X.J.
core   +3 more sources

Mechanically Spatio‐Chimeric Fibrin Assembly Enables Vascular‐Integrated Muscle Reconstruction for Volumetric Muscle Loss Repair

open access: yesAdvanced Materials, EarlyView.
SPARC (spatio‐chimeric, plasma‐based, anisotropic, and shear‐responsive construct) that integrates myogenic and vascular microenvironments within a single construct. The dual‐modulus matrix directs aligned myotube formation and endothelial network development, enabling a vascularized muscle implant that seamlessly anastomoses with host tissue and ...
Su Hyun Jung   +6 more
wiley   +1 more source

Security of signed ELGamal encryption [PDF]

open access: yes, 2005
Assuming a cryptographically strong cyclic group G of prime order q and a random hash function H, we show that ElGamal encryption with an added Schnorr signature is secure against the adaptive chosen ciphertext attack, in which an attacker can freely use
Jakobsson, Markus, Schnorr, Claus Peter
core  

Mechanical Stress Evolution in Polycrystalline Ge Thin Films Under MeV Ion Irradiation

open access: yesAdvanced Materials Interfaces, EarlyView.
Irradiation of polycrystalline Ge thin films with 1.8 MeV Au ions alters residual stress through defect generation and lattice expansion. Increasing fluence drives progressive lattice disorder and eventual amorphization. Polycrystalline Ge resists amorphization longer than crystalline Ge, as grain boundaries facilitate defect diffusion, significantly ...
Karla J. Paz Corrales   +10 more
wiley   +1 more source

Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

open access: yesTongxin xuebao, 2014
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented.
Gao-li WANG, Yan-zhao SHEN
doaj   +2 more sources

Improvement on a Masked White-Box Cryptographic Implementation

open access: yesIEEE Access, 2020
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information ...
Seungkwang Lee, Myungchul Kim
doaj   +1 more source

A Symbolic Intruder Model for Hash-Collision Attacks [PDF]

open access: yes, 2006
In the recent years, several practical methods have been published to compute collisions on some commonly used hash functions. In this paper we present a method to take into account, at the symbolic level, that an intruder actively attacking a protocol ...
Chevalier, Yannick, Kourjieh, Mounira
core   +2 more sources

Home - About - Disclaimer - Privacy