Grayscale Image Authentication using Neural Hashing
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core +2 more sources
Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing
Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge servers). Side-channel attacks main threaten to these devices.
Yaoling Ding+5 more
doaj +1 more source
A second pre-image attack and a collision attack to cryptographic hash function lux
Cryptography is a science that provides the security of information in communication. One of the most important sub-branches of cryptography is the hash functions. Hash functions are known as the digital fingerprints. Following the recent attacks on the widely used hash functions MD5 and SHA-1 and the increase in computational power, the need for a new
SULAK, Fatih+4 more
openaire +4 more sources
An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks [PDF]
Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices.
Udoh, E., Udoh, E.
core
Study of Solid Particle Erosion on Helicopter Rotor Blades Surfaces
In this study, titanium alloy (Ti-4Al-1.5Mn), magnesium alloy (Mg-Li9-A3-Zn3), or aluminum alloy (Al7075-T6) were used to construct the shell model of helicopter rotor blade to study the solid particle erosion of helicopter rotor blades.
Xupeng Bai+4 more
doaj +1 more source
Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing [PDF]
Lipeng Chang+3 more
openalex +1 more source
Fault Attack of SMS4 Based on Internal Collisions
Abstract A fault attack of SMS4 based on internal collision is proposed. The method assumes that the attacker can attack under the condition of selecting plaintext, and adopts the byte-oriented random fault model to successfully recover the original key by injecting the fault in the first few rounds of the encryption algorithm of the ...
Fang Luo, Renjie Zhu, Qingyu Ou
openaire +2 more sources
Research on the multi-message modification techniques on MD5
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj
Rethinking Tag Collisions for Replay and Relay Attack Resistance in Backscatter Networks [PDF]
Hoorin Park, Wonjun Lee
openalex +1 more source
Breaking and making quantum money: toward a new quantum cryptographic protocol [PDF]
Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge.
Aaronson, Scott+6 more
core +1 more source