Results 21 to 30 of about 264,704 (267)
SSHCure: a flow-based SSH intrusion detection system [PDF]
SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity.
Hellemons, Laurens +6 more
core +5 more sources
Differential fault analysis on EMV application cryptogram
The process of application cryptogram in EMV was researched and dummy bits in session key were found.Based on the session key’s dummy bits and compressive property of DES’s Sbox,much information of the application cryptogram master key was got by using ...
Qian PENG, Zeng-ju LI, Ru-hui SHI
doaj +3 more sources
Improved security analysis of PMAC
In this paper we provide a simple, concrete and improved security analysis of Parallelizable Message Authentication Code or PMAC. In particular, we show that the advantage of any distinguisher at distinguishing PMAC from a random function is at most ...
Nandi Mridul, Mandal Avradip
doaj +1 more source
MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov +14 more
core +3 more sources
Improved security analysis for OMAC as a pseudorandom function
This paper shows that the advantage of any q-query adversary (which makes at most q queries) for distinguishing OMAC from a uniform random function is roughly Lq2/2n.
Nandi Mridul
doaj +1 more source
Template Attacks Against Lightweight Block Cipher Algorithm DoT [PDF]
As an important way of side channel analysis,template attacks have excellent distinguishing ability in the cracking of encryption algorithms.Recently,a lightweight block cipher algorithm called DoT performs well in both hardware and software ...
SUN Jiayi, WEI Yongzhuang
doaj +1 more source
Is Quantum Bit Commitment Really Possible? [PDF]
We show that all proposed quantum bit commitment schemes are insecure because the sender, Alice, can almost always cheat successfully by using an Einstein-Podolsky-Rosen type of attack and delaying her measurement until she opens her commitment.Comment ...
A. C.-C. Yao +21 more
core +3 more sources
A New Algorithm for Solving Ring-LPN with a Reducible Polynomial [PDF]
The LPN (Learning Parity with Noise) problem has recently proved to be of great importance in cryptology. A special and very useful case is the RING-LPN problem, which typically provides improved efficiency in the constructed cryptographic primitive.
Guo, Qian +2 more
core +1 more source
Explicit attacks on BB84 with distinguishable photons
Comments ...
Babukhin, D., Kronberg, D., Sych, D.
openaire +2 more sources
Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack [PDF]
The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric ...
Daisuke SUZUKI +2 more
core +2 more sources

