Results 11 to 20 of about 406,684 (268)

Automating Collision Attacks on RIPEMD-160

open access: yesIACR Transactions on Symmetric Cryptology, 2023
As an ISO/IEC standard, the hash function RIPEMD-160 has been used to generate the Bitcoin address with SHA-256. However, due to the complex doublebranch structure of RIPEMD-160, the best collision attack only reaches 36 out of 80 steps of RIPEMD-160 ...
Yingxin Li, Fukang Liu, Gaoli Wang
doaj   +1 more source

Differential Effects of Neonatal Testosterone Treatment on Aggression in Two Selection Lines of Mice [PDF]

open access: yes, 1992
Selection lines of mice, artificially selected for aggression based upon the attack latency score (ALS), were used. In order to determine the relative contribution of neonatal testosterone (T) in the development of aggression, we vary the plasma-T level ...
Bohus, Béla,   +4 more
core   +6 more sources

Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol [PDF]

open access: yes, 2006
In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. Our attack differs from
Tsurumaru, Toyohiro
core   +2 more sources

Cryptanalysis of an Encryption Scheme Based on Blind Source Separation [PDF]

open access: yes, 2006
Recently Lin et al. proposed a method of using the underdetermined BSS (blind source separation) problem to realize image and speech encryption. In this paper, we give a cryptanalysis of this BSS-based encryption and point out that it is not secure ...
Chen, Guanrong   +3 more
core   +2 more sources

On the Security of the Yi-Tan-Siew Chaos-Based Cipher [PDF]

open access: yes, 2004
This paper presents a comprehensive analysis on the security of the Yi-Tan-Siew chaotic cipher proposed in [IEEE TCAS-I 49(12):1826-1829 (2002)]. A differential chosen-plaintext attack and a differential chosen-ciphertext attack are suggested to break ...
Chen, Guanrong, Li, Shujun, Mou, Xuanqin
core   +2 more sources

Differential Attacks on Generalized Feistel Schemes [PDF]

open access: yes, 2013
While generic attacks on classical Feistel schemes and unbalanced Feistel schemes have been studied a lot, generic attacks on several generalized Feistel schemes like type-1, type-2 and type-3 and alternating Feistel schemes, as defined in [8], have not been systematically investigated.
Nachef, Valérie   +2 more
openaire   +2 more sources

Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK

open access: yesIET Information Security, 2023
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj   +1 more source

Image Adversarial Example Generation Method Based on Adaptive Parameter Adjustable Differential Evolution

open access: yesEntropy, 2023
Adversarial example generation techniques for neural network models have exploded in recent years. In the adversarial attack scheme for image recognition models, it is challenging to achieve a high attack success rate with very few pixel modifications ...
Zhiyi Lin   +3 more
doaj   +1 more source

New, efficient and robust, fiber-based quantum key distribution schemes [PDF]

open access: yes, 2002
We present a new fiber based quantum key distribution (QKD) scheme which can be regarded as a modification of an idea proposed by Inoue, Waks and Yamamoto (IWY) [1].
Bennett   +28 more
core   +2 more sources

Impossible differential cryptanalysis of Saturnin algorithm

open access: yesTongxin xuebao, 2022
A lightweight block cipher, Saturnin, is an AES-like algorithm.In a resource-constrained environment, Saturnin can also provide high security.The impossible differential analysis on Saturnin was proposed.First, based on the structure of Saturnin, the ...
Zilong JIANG, Chenhui JIN
doaj   +2 more sources

Home - About - Disclaimer - Privacy