Results 11 to 20 of about 406,684 (268)
Automating Collision Attacks on RIPEMD-160
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address with SHA-256. However, due to the complex doublebranch structure of RIPEMD-160, the best collision attack only reaches 36 out of 80 steps of RIPEMD-160 ...
Yingxin Li, Fukang Liu, Gaoli Wang
doaj +1 more source
Differential Effects of Neonatal Testosterone Treatment on Aggression in Two Selection Lines of Mice [PDF]
Selection lines of mice, artificially selected for aggression based upon the attack latency score (ALS), were used. In order to determine the relative contribution of neonatal testosterone (T) in the development of aggression, we vary the plasma-T level ...
Bohus, Béla, +4 more
core +6 more sources
Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol [PDF]
In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. Our attack differs from
Tsurumaru, Toyohiro
core +2 more sources
Cryptanalysis of an Encryption Scheme Based on Blind Source Separation [PDF]
Recently Lin et al. proposed a method of using the underdetermined BSS (blind source separation) problem to realize image and speech encryption. In this paper, we give a cryptanalysis of this BSS-based encryption and point out that it is not secure ...
Chen, Guanrong +3 more
core +2 more sources
On the Security of the Yi-Tan-Siew Chaos-Based Cipher [PDF]
This paper presents a comprehensive analysis on the security of the Yi-Tan-Siew chaotic cipher proposed in [IEEE TCAS-I 49(12):1826-1829 (2002)]. A differential chosen-plaintext attack and a differential chosen-ciphertext attack are suggested to break ...
Chen, Guanrong, Li, Shujun, Mou, Xuanqin
core +2 more sources
Differential Attacks on Generalized Feistel Schemes [PDF]
While generic attacks on classical Feistel schemes and unbalanced Feistel schemes have been studied a lot, generic attacks on several generalized Feistel schemes like type-1, type-2 and type-3 and alternating Feistel schemes, as defined in [8], have not been systematically investigated.
Nachef, Valérie +2 more
openaire +2 more sources
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj +1 more source
Adversarial example generation techniques for neural network models have exploded in recent years. In the adversarial attack scheme for image recognition models, it is challenging to achieve a high attack success rate with very few pixel modifications ...
Zhiyi Lin +3 more
doaj +1 more source
New, efficient and robust, fiber-based quantum key distribution schemes [PDF]
We present a new fiber based quantum key distribution (QKD) scheme which can be regarded as a modification of an idea proposed by Inoue, Waks and Yamamoto (IWY) [1].
Bennett +28 more
core +2 more sources
Impossible differential cryptanalysis of Saturnin algorithm
A lightweight block cipher, Saturnin, is an AES-like algorithm.In a resource-constrained environment, Saturnin can also provide high security.The impossible differential analysis on Saturnin was proposed.First, based on the structure of Saturnin, the ...
Zilong JIANG, Chenhui JIN
doaj +2 more sources

