Practical Related-Key Forgery Attacks on Full-Round TinyJAMBU-192/256
TinyJAMBU is one of the finalists in the NIST lightweight cryptography competition. It is considered to be one of the more efficient ciphers in the competition and has undergone extensive analysis in recent years as both the keyed permutation as well as
Orr Dunkelman +2 more
doaj +3 more sources
The Study into Cross-Site Request Forgery Attacks within the Framework of Analysis of Software Vulnerabilities [PDF]
Nowadays, web applications are one of the most popular types of target of evaluation within the framework of the information security certification. The relevance of the study of web applications vulnerabilities during information security certification ...
A. V. Barabanov +4 more
doaj +2 more sources
Post-Quantum Security of COPA [PDF]
COPA is a notable authenticated online cipher and was one of the winning proposals for the CAESAR competition. Current works describe how to break the existentially unforgeable under quantum chosen message attack (EUF-qCMA) of COPA.
Ping Zhang, Yutao Wang
doaj +2 more sources
A New Efficient and Provably Secure Certificateless Signature Scheme Without Bilinear Pairings for the Internet of Things [PDF]
Pairing-free certificateless signature (PF-CLS) schemes are ideal authentication solutions for resource-constrained environments like the Internet of Things (IoT) due to their low computational, storage, and communication resource requirements.
Zhanzhen Wei +4 more
doaj +2 more sources
Survey on adversarial attacks and defense of face forgery and detection
Face forgery and detection has become a research hotspot.Face forgery methods can produce fake face images and videos.Some malicious videos, often targeting celebrities, are widely circulated on social networks, damaging the reputation of victims and ...
Shiyu HUANG, Feng YE, Tianqiang HUANG, Wei LI, Liqing HUANG, Haifeng LUO
doaj +3 more sources
On the Effect of Malicious User on D2D Cluster: CSI Forgery and Countermeasures
Device-to-device (D2D) communication in cellular networks refers to a technology that enables direct transmission and reception between devices in proximity without infrastructures such as base stations (BSs).
Inkyu Bang +3 more
doaj +1 more source
Remote Check Truncation Systems: Vulnerability Analysis and Countermeasures
All major banks in the USA and around the world offer remote check deposit services. Consumers can use their smart phones to deposit checks remotely.
Hafiz Malik +4 more
doaj +1 more source
New cryptanalysis of the authenticated cipher model JAMBU
Based on the characteristic of JAMBU,a forgery attack by using the principle,where the associated data can be transformed into the plaintext was proposed.It is shown that the attack requires a data complexity of about 2n2chosen plaintext,and a time ...
Yu-dan TIAN, Yong-zhuang WEI
doaj +3 more sources
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Authentication encryption algorithms have been widely used in networks security system since these al-gorithms can efficiently provide both privacy and integrity measurement for data transmission.
Yu-dan TIAN, Yong-zhuang WEI
doaj +3 more sources
Copy move forgery detection using key point localized super pixel based on texture features [PDF]
The most important barrier in the image forensic is to ensue a forgery detection method such can detect the copied region which sustains rotation, scaling reflection, compressing or all.
C. Rajalakshmi +2 more
doaj +1 more source

