Results 1 to 10 of about 36,628 (176)

Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256

open access: diamondIACR Transactions on Symmetric Cryptology, 2023
TinyJAMBU is one of the finalists in the NIST lightweight cryptography competition. It is considered to be one of the more efficient ciphers in the competition and has undergone extensive analysis in recent years as both the keyed permutation as well as
Orr Dunkelman   +2 more
doaj   +3 more sources

The Study into Cross-Site Request Forgery Attacks within the Framework of Analysis of Software Vulnerabilities [PDF]

open access: diamondТруды Института системного программирования РАН, 2018
Nowadays, web applications are one of the most popular types of target of evaluation within the framework of the information security certification. The relevance of the study of web applications vulnerabilities during information security certification ...
A. V. Barabanov   +4 more
doaj   +2 more sources

Post-Quantum Security of COPA [PDF]

open access: yesEntropy
COPA is a notable authenticated online cipher and was one of the winning proposals for the CAESAR competition. Current works describe how to break the existentially unforgeable under quantum chosen message attack (EUF-qCMA) of COPA.
Ping Zhang, Yutao Wang
doaj   +2 more sources

A New Efficient and Provably Secure Certificateless Signature Scheme Without Bilinear Pairings for the Internet of Things [PDF]

open access: yesSensors
Pairing-free certificateless signature (PF-CLS) schemes are ideal authentication solutions for resource-constrained environments like the Internet of Things (IoT) due to their low computational, storage, and communication resource requirements.
Zhanzhen Wei   +4 more
doaj   +2 more sources

Survey on adversarial attacks and defense of face forgery and detection

open access: yes网络与信息安全学报, 2023
Face forgery and detection has become a research hotspot.Face forgery methods can produce fake face images and videos.Some malicious videos, often targeting celebrities, are widely circulated on social networks, damaging the reputation of victims and ...
Shiyu HUANG, Feng YE, Tianqiang HUANG, Wei LI, Liqing HUANG, Haifeng LUO
doaj   +3 more sources

On the Effect of Malicious User on D2D Cluster: CSI Forgery and Countermeasures

open access: yesIEEE Access, 2023
Device-to-device (D2D) communication in cellular networks refers to a technology that enables direct transmission and reception between devices in proximity without infrastructures such as base stations (BSs).
Inkyu Bang   +3 more
doaj   +1 more source

Remote Check Truncation Systems: Vulnerability Analysis and Countermeasures

open access: yesIEEE Access, 2020
All major banks in the USA and around the world offer remote check deposit services. Consumers can use their smart phones to deposit checks remotely.
Hafiz Malik   +4 more
doaj   +1 more source

New cryptanalysis of the authenticated cipher model JAMBU

open access: yes网络与信息安全学报, 2017
Based on the characteristic of JAMBU,a forgery attack by using the principle,where the associated data can be transformed into the plaintext was proposed.It is shown that the attack requires a data complexity of about 2n2chosen plaintext,and a time ...
Yu-dan TIAN, Yong-zhuang WEI
doaj   +3 more sources

New forgery attack on the authenticated cipher SCREAM and iSCREAM

open access: yes网络与信息安全学报, 2016
Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission.
Yu-dan TIAN, Yong-zhuang WEI
doaj   +3 more sources

Copy move forgery detection using key point localized super pixel based on texture features [PDF]

open access: yesКомпьютерная оптика, 2019
The most important barrier in the image forensic is to ensue a forgery detection method such can detect the copied region which sustains rotation, scaling reflection, compressing or all.
C. Rajalakshmi   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy