Results 21 to 30 of about 264,704 (267)

SSHCure: a flow-based SSH intrusion detection system [PDF]

open access: yes, 2012
SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity.
Hellemons, Laurens   +6 more
core   +5 more sources

Differential fault analysis on EMV application cryptogram

open access: yes网络与信息安全学报, 2016
The process of application cryptogram in EMV was researched and dummy bits in session key were found.Based on the session key’s dummy bits and compressive property of DES’s Sbox,much information of the application cryptogram master key was got by using ...
Qian PENG, Zeng-ju LI, Ru-hui SHI
doaj   +3 more sources

Improved security analysis of PMAC

open access: yesJournal of Mathematical Cryptology, 2008
In this paper we provide a simple, concrete and improved security analysis of Parallelizable Message Authentication Code or PMAC. In particular, we show that the advantage of any distinguisher at distinguishing PMAC from a random function is at most ...
Nandi Mridul, Mandal Avradip
doaj   +1 more source

MV3: A new word based stream cipher using rapid mixing and revolving buffers [PDF]

open access: yes, 2006
MV3 is a new word based stream cipher for encrypting long streams of data. A direct adaptation of a byte based cipher such as RC4 into a 32- or 64-bit word version will obviously need vast amounts of memory. This scaling issue necessitates a look for new
A. Biryukov   +14 more
core   +3 more sources

Improved security analysis for OMAC as a pseudorandom function

open access: yesJournal of Mathematical Cryptology, 2009
This paper shows that the advantage of any q-query adversary (which makes at most q queries) for distinguishing OMAC from a uniform random function is roughly Lq2/2n.
Nandi Mridul
doaj   +1 more source

Template Attacks Against Lightweight Block Cipher Algorithm DoT [PDF]

open access: yesJisuanji gongcheng, 2021
As an important way of side channel analysis,template attacks have excellent distinguishing ability in the cracking of encryption algorithms.Recently,a lightweight block cipher algorithm called DoT performs well in both hardware and software ...
SUN Jiayi, WEI Yongzhuang
doaj   +1 more source

Is Quantum Bit Commitment Really Possible? [PDF]

open access: yes, 1996
We show that all proposed quantum bit commitment schemes are insecure because the sender, Alice, can almost always cheat successfully by using an Einstein-Podolsky-Rosen type of attack and delaying her measurement until she opens her commitment.Comment ...
A. C.-C. Yao   +21 more
core   +3 more sources

A New Algorithm for Solving Ring-LPN with a Reducible Polynomial [PDF]

open access: yes, 2014
The LPN (Learning Parity with Noise) problem has recently proved to be of great importance in cryptology. A special and very useful case is the RING-LPN problem, which typically provides improved efficiency in the constructed cryptographic primitive.
Guo, Qian   +2 more
core   +1 more source

Explicit attacks on BB84 with distinguishable photons

open access: yes, 2022
Comments ...
Babukhin, D., Kronberg, D., Sych, D.
openaire   +2 more sources

Asymmetric Leakage from Multiplier and Collision-Based Single-Shot Side-Channel Attack [PDF]

open access: yes, 2016
The single-shot collision attack on RSA proposed by Hanley et al. is studied focusing on the difference between two operands of multiplier. It is shown that how leakage from integer multiplier and long-integer multiplication algorithm can be asymmetric ...
Daisuke SUZUKI   +2 more
core   +2 more sources

Home - About - Disclaimer - Privacy