Results 71 to 80 of about 131,000 (194)

Grayscale Image Authentication using Neural Hashing

open access: yes, 2016
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core   +2 more sources

Adaptive Chosen-Plaintext Collision Attack on Masked AES in Edge Computing

open access: yesIEEE Access, 2019
Edge computing handles delay-sensitive data and provides real-time feedback, while it brings data security issues to edge devices (such as IoT devices and edge servers). Side-channel attacks main threaten to these devices.
Yaoling Ding   +5 more
doaj   +1 more source

A second pre-image attack and a collision attack to cryptographic hash function lux

open access: yesCommunications Faculty Of Science University of Ankara Series A1Mathematics and Statistics, 2017
Cryptography is a science that provides the security of information in communication. One of the most important sub-branches of cryptography is the hash functions. Hash functions are known as the digital fingerprints. Following the recent attacks on the widely used hash functions MD5 and SHA-1 and the increase in computational power, the need for a new
SULAK, Fatih   +4 more
openaire   +4 more sources

An Energy Aware and Secure MAC Protocol for Tackling Denial of Sleep Attacks in Wireless Sensor Networks [PDF]

open access: yes, 2019
Wireless sensor networks which form part of the core for the Internet of Things consist of resource constrained sensors that are usually powered by batteries. Therefore, careful energy awareness is essential when working with these devices.
Udoh, E., Udoh, E.
core  

Study of Solid Particle Erosion on Helicopter Rotor Blades Surfaces

open access: yesApplied Sciences, 2020
In this study, titanium alloy (Ti-4Al-1.5Mn), magnesium alloy (Mg-Li9-A3-Zn3), or aluminum alloy (Al7075-T6) were used to construct the shell model of helicopter rotor blade to study the solid particle erosion of helicopter rotor blades.
Xupeng Bai   +4 more
doaj   +1 more source

Collision Forgery Attack on the AES-OTR Algorithm under Quantum Computing [PDF]

open access: gold, 2022
Lipeng Chang   +3 more
openalex   +1 more source

Fault Attack of SMS4 Based on Internal Collisions

open access: yesJournal of Physics: Conference Series, 2020
Abstract A fault attack of SMS4 based on internal collision is proposed. The method assumes that the attacker can attack under the condition of selecting plaintext, and adopts the byte-oriented random fault model to successfully recover the original key by injecting the fault in the first few rounds of the encryption algorithm of the ...
Fang Luo, Renjie Zhu, Qingyu Ou
openaire   +2 more sources

Research on the multi-message modification techniques on MD5

open access: yesTongxin xuebao, 2009
According to research on the message modification techniques presented by Wang Xiaoyun et al and the advanced message modification techniques proposed by Yu Sasaki et al, the multi-message modification techniques were founded to not be always able to ...
CHEN Shi-wei, JIN Chen-hui
doaj  

Breaking and making quantum money: toward a new quantum cryptographic protocol [PDF]

open access: yes, 2009
Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify but no one except possibly the bank can clone or forge.
Aaronson, Scott   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy