Results 81 to 90 of about 131,000 (194)
Cryptanalysis of 48-step RIPEMD-160
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 under the condition that only one internal variable contains difference and the difference is a power of 2.
Gaoli Wang, Yanzhao Shen, Fukang Liu
doaj +1 more source
One Password: An Encryption Scheme for Hiding Users' Register Information
In recent years, the attack which leverages register information (e.g. accounts and passwords) leaked from 3rd party applications to try other applications is popular and serious. We call this attack "database collision".
Zhao, Bo, Zhou, Yu
core
On the dynamics of chemical reactions of negative ions
This review discusses the dynamics of negative ion reactions with neutral molecules in the gas phase. Most anion-molecule reactions proceed via a qualitatively different interaction potential than cationic or neutral reactions.
Mikosch, Jochen+2 more
core +1 more source
Quantum Random Oracle Model for Quantum Public-Key Encryption
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj +1 more source
Horizontal Collision Correlation Attack on Elliptic Curves [PDF]
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of providing efficient implementations with short certificates and of being relatively easy to secure against side-channel attacks.
Éliane Jaulmes+3 more
openaire +2 more sources
Security of quantum cryptography using balanced homodyne detection
In this paper we investigate the security of a quantum cryptographic scheme which utilizes balanced homodyne detection and weak coherent pulse (WCP).
A.K. Ekert+25 more
core +1 more source
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
Jinkeon Kang+4 more
doaj +1 more source
Optimizing Fast Near Collision Attack on Grain Using Linear Programming
In 2018, an attack named fast-near-collision attack (FNCA) was proposed, which is an improved version of near-collision attack (NCA) on Grain-v1, one of the three hardware-oriented finalists of the eSTREAM project.
Senshan Pan, Yueping Wu, Liangmin Wang
doaj +1 more source
Can NSEC5 be practical for DNSSEC deployments? [PDF]
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon+6 more
core
Preserving Both Privacy and Utility in Network Trace Anonymization
As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive ...
Adam+22 more
core +1 more source