Results 81 to 90 of about 131,000 (194)

Cryptanalysis of 48-step RIPEMD-160

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this paper, we show how to theoretically compute the step differential probability of RIPEMD-160 under the condition that only one internal variable contains difference and the difference is a power of 2.
Gaoli Wang, Yanzhao Shen, Fukang Liu
doaj   +1 more source

One Password: An Encryption Scheme for Hiding Users' Register Information

open access: yes, 2017
In recent years, the attack which leverages register information (e.g. accounts and passwords) leaked from 3rd party applications to try other applications is popular and serious. We call this attack "database collision".
Zhao, Bo, Zhou, Yu
core  

On the dynamics of chemical reactions of negative ions

open access: yes, 2010
This review discusses the dynamics of negative ion reactions with neutral molecules in the gas phase. Most anion-molecule reactions proceed via a qualitatively different interaction potential than cationic or neutral reactions.
Mikosch, Jochen   +2 more
core   +1 more source

Quantum Random Oracle Model for Quantum Public-Key Encryption

open access: yesIEEE Access, 2019
Random oracle model is a general security analysis tool for rigorous security proof and effective cryptographic protocol design. In the quantum world, the attempts of constructing a quantum random oracle (QRO) have been made, such as quantum-accessible ...
Tao Shang, Ranyiliu Chen, Qi Lei
doaj   +1 more source

Horizontal Collision Correlation Attack on Elliptic Curves [PDF]

open access: yes, 2014
Elliptic curves based algorithms are nowadays widely spread among embedded systems. They indeed have the double advantage of providing efficient implementations with short certificates and of being relatively easy to secure against side-channel attacks.
Éliane Jaulmes   +3 more
openaire   +2 more sources

Security of quantum cryptography using balanced homodyne detection

open access: yes, 2003
In this paper we investigate the security of a quantum cryptographic scheme which utilizes balanced homodyne detection and weak coherent pulse (WCP).
A.K. Ekert   +25 more
core   +1 more source

Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis

open access: yesJournal of Applied Mathematics, 2013
At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply this idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.
Jinkeon Kang   +4 more
doaj   +1 more source

Optimizing Fast Near Collision Attack on Grain Using Linear Programming

open access: yesIEEE Access, 2019
In 2018, an attack named fast-near-collision attack (FNCA) was proposed, which is an improved version of near-collision attack (NCA) on Grain-v1, one of the three hardware-oriented finalists of the eSTREAM project.
Senshan Pan, Yueping Wu, Liangmin Wang
doaj   +1 more source

Can NSEC5 be practical for DNSSEC deployments? [PDF]

open access: yes, 2017
NSEC5 is proposed modification to DNSSEC that simultaneously guarantees two security properties: (1) privacy against offline zone enumeration, and (2) integrity of zone contents, even if an adversary compromises the authoritative nameserver responsible ...
Goldberg, Sharon   +6 more
core  

Preserving Both Privacy and Utility in Network Trace Anonymization

open access: yes, 2018
As network security monitoring grows more sophisticated, there is an increasing need for outsourcing such tasks to third-party analysts. However, organizations are usually reluctant to share their network traces due to privacy concerns over sensitive ...
Adam   +22 more
core   +1 more source

Home - About - Disclaimer - Privacy