Results 11 to 20 of about 36,777 (311)
Exploring Frequency Adversarial Attacks for Face Forgery Detection [PDF]
Comment: Accepted by ...
Shuai Jia +5 more
openalex +3 more sources
Deep Learning-Based Forgery Attack on Document Images [PDF]
With the ongoing popularization of online services, the digital document images have been used in various applications. Meanwhile, there have emerged some deep learning-based text editing algorithms which alter the textual information of an image . In this work, we present a document forgery algorithm to edit practical document images.
Lin Zhao, Changsheng Chen, Jiwu Huang
openalex +5 more sources
Forgery attacks on ++AE authenticated encryption mode [PDF]
In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic competition for authenticated encryption (CAESAR). This mode is designed by Recacha and called ++AE (plus-plus-ae). We propose a chosen plaintext forgery attack on ++AE that requires only a single chosen message query to allow an attacker to construct ...
Hassan Qahur Al Mahri +4 more
openalex +3 more sources
A MAC Forgery Attack on SOBER-128 [PDF]
SOBER-128 is a stream cipher designed by Rose and Hawkes in 2003. It can be also uses for generating Message Authentication Codes (MACs). The developers claimed that it is difficult to forge the MAC generated by SOBER-128, though, the security model defined in the proposal paper is not realistic.
Dai Watanabe, Soichi Furuya
openalex +3 more sources
Generalized forgery attack to optical encryption systems
In previous works, the attacking methods to optical encryption systems are mainly investigated from the aspect of cryptanalysis. An alternative forgery attack is proposed recently for an encrypted computational ghost imaging (CGI) system by confusing the receiver with forged keys and fake decrypted images.
Jun Feng +3 more
openalex +2 more sources
Universal Forgery Attack Against GCM-RUP
Authenticated encryption (AE) schemes are widely used to secure communications because they can guarantee both confidentiality and authenticity of a message. In addition to the standard AE security notion, some recent schemes offer extra robustness, i.e. they maintain security in some misuse scenarios. In particular, Ashur, Dunkelman and Luykx proposed
Yanbin Li +5 more
openalex +5 more sources
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm [PDF]
We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, these techniques will work when the MAC calculation involves prefixing the data to be MACed with a 'length block'. These attack methods provide new (tighter) upper bounds on the level of
Don Coppersmith +2 more
openalex +13 more sources
Forgery attacks on several certificateless signature schemes
Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003, a lot of certificateless signature schemes were proposed one after another. Recently, Tang et al proposed nine certificateless signature schemes without bilinear pairing.
Jing Wang, LI Zumeng
openalex +4 more sources
Extending Bleichenbacher's Forgery Attack
In 2006, Bleichenbacher presented a new forgery attack against the signature scheme RSASSA-PKCS1-v1_5. The attack allows an adversary to forge a signature on almost arbitrary messages, if an implementation is not proper. Since the example was only limited to the case when the public exponent is 3 and the bit-length of the public composite is 3, 072 ...
Tetsuya Izu +2 more
openaire +3 more sources
Quantum-secure message authentication via blind-unforgeability [PDF]
Formulating and designing unforgeable authentication of classical messages in the presence of quantum adversaries has been a challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful notions in the quantum ...
CH Bennett +17 more
core +3 more sources

