Results 11 to 20 of about 36,777 (311)

Exploring Frequency Adversarial Attacks for Face Forgery Detection [PDF]

open access: green2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), 2022
Comment: Accepted by ...
Shuai Jia   +5 more
openalex   +3 more sources

Deep Learning-Based Forgery Attack on Document Images [PDF]

open access: greenIEEE Transactions on Image Processing, 2021
With the ongoing popularization of online services, the digital document images have been used in various applications. Meanwhile, there have emerged some deep learning-based text editing algorithms which alter the textual information of an image . In this work, we present a document forgery algorithm to edit practical document images.
Lin Zhao, Changsheng Chen, Jiwu Huang
openalex   +5 more sources

Forgery attacks on ++AE authenticated encryption mode [PDF]

open access: greenProceedings of the Australasian Computer Science Week Multiconference, 2016
In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic competition for authenticated encryption (CAESAR). This mode is designed by Recacha and called ++AE (plus-plus-ae). We propose a chosen plaintext forgery attack on ++AE that requires only a single chosen message query to allow an attacker to construct ...
Hassan Qahur Al Mahri   +4 more
openalex   +3 more sources

A MAC Forgery Attack on SOBER-128 [PDF]

open access: bronze, 2004
SOBER-128 is a stream cipher designed by Rose and Hawkes in 2003. It can be also uses for generating Message Authentication Codes (MACs). The developers claimed that it is difficult to forge the MAC generated by SOBER-128, though, the security model defined in the proposal paper is not realistic.
Dai Watanabe, Soichi Furuya
openalex   +3 more sources

Generalized forgery attack to optical encryption systems

open access: goldOptics Express, 2021
In previous works, the attacking methods to optical encryption systems are mainly investigated from the aspect of cryptanalysis. An alternative forgery attack is proposed recently for an encrypted computational ghost imaging (CGI) system by confusing the receiver with forged keys and fake decrypted images.
Jun Feng   +3 more
openalex   +2 more sources

Universal Forgery Attack Against GCM-RUP

open access: green, 2020
Authenticated encryption (AE) schemes are widely used to secure communications because they can guarantee both confidentiality and authenticity of a message. In addition to the standard AE security notion, some recent schemes offer extra robustness, i.e. they maintain security in some misuse scenarios. In particular, Ashur, Dunkelman and Luykx proposed
Yanbin Li   +5 more
openalex   +5 more sources

Key Recovery and Forgery Attacks on the MacDES MAC Algorithm [PDF]

open access: bronze, 2000
We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, these techniques will work when the MAC calculation involves prefixing the data to be MACed with a 'length block'. These attack methods provide new (tighter) upper bounds on the level of
Don Coppersmith   +2 more
openalex   +13 more sources

Forgery attacks on several certificateless signature schemes

open access: green网络与信息安全学报, 2020
Since Al-Riyami and Paterson proposed the novel concept of certificateless cryptography and the first certificateless signature scheme in 2003, a lot of certificateless signature schemes were proposed one after another. Recently, Tang et al proposed nine certificateless signature schemes without bilinear pairing.
Jing Wang, LI Zumeng
openalex   +4 more sources

Extending Bleichenbacher's Forgery Attack

open access: yesJournal of Information Processing, 2008
In 2006, Bleichenbacher presented a new forgery attack against the signature scheme RSASSA-PKCS1-v1_5. The attack allows an adversary to forge a signature on almost arbitrary messages, if an implementation is not proper. Since the example was only limited to the case when the public exponent is 3 and the bit-length of the public composite is 3, 072 ...
Tetsuya Izu   +2 more
openaire   +3 more sources

Quantum-secure message authentication via blind-unforgeability [PDF]

open access: yes, 2020
Formulating and designing unforgeable authentication of classical messages in the presence of quantum adversaries has been a challenge, as the familiar classical notions of unforgeability do not directly translate into meaningful notions in the quantum ...
CH Bennett   +17 more
core   +3 more sources

Home - About - Disclaimer - Privacy