Results 21 to 30 of about 257,742 (291)

Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Recently, Hosoyamada and Sasaki (EUROCRYPT 2020), and Xiaoyang Dong et al. (ASIACRYPT 2020) proposed quantum collision attacks against AES-like hashing modes AES-MMO and AES-MP.
Amit Kumar Chauhan   +2 more
doaj   +1 more source

Cyclic Bayesian Attack Graphs: A Systematic Computational Approach

open access: yes, 2020
Attack graphs are commonly used to analyse the security of medium-sized to large networks. Based on a scan of the network and likelihood information of vulnerabilities, attack graphs can be transformed into Bayesian Attack Graphs (BAGs).
Mace, John   +3 more
core   +1 more source

Simply Good: A Defence of the Principia [PDF]

open access: yes, 2017
Moore's moral programme is increasingly unpopular. Judith Jarvis Thomson's attack has been especially influential; she says the Moorean project fails because ‘there is no such thing as goodness’. I argue that her objection does not succeed: while Thomson
Tucker, Miles
core   +1 more source

A deep learning‐based attack on text CAPTCHAs by using object detection techniques

open access: yesIET Information Security, 2022
Text‐based CAPTCHAs have been widely deployed by many popular websites, and many have been attacked. However, most previous cracks were based on classification algorithms that typically rely on a series of preprocessing operations or on many training ...
Jiawei Nian   +3 more
doaj   +1 more source

Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We show generic attacks on unbalanced Feistel ciphers based on the meet-in-the-middle technique. We analyze two general classes of unbalanced Feistel structures, namely contracting Feistels and expanding Feistels.
Jian Guo   +3 more
doaj   +1 more source

Single-Trace Attacks on Keccak

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2020
Since its selection as the winner of the SHA-3 competition, Keccak, with all its variants, has found a large number of applications. It is, for instance, a common building block in schemes submitted to NIST’s post-quantum cryptography project. In many of
Matthias J. Kannwischer   +2 more
doaj   +1 more source

Quantum rebound attacks on reduced-round ARIA-based hash functions

open access: yesETRI Journal, 2023
ARIA is a block cipher proposed by Kwon et al. at ICISC 2003 that is widely used as the national standard block cipher in the Republic of Korea. Herein, we identify some flaws in the quantum rebound attack on seven-round ARIA-DM proposed by Dou et al ...
Seungjun Baek, Jongsung Kim
doaj   +1 more source

PudgyTurtle Mode Resists Bit-Flipping Attacks

open access: yesCryptography, 2023
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message.
David A. August, Anne C. Smith
doaj   +1 more source

Boomeyong: Embedding Yoyo within Boomerang and its Applications to Key Recovery Attacks on AES and Pholkos

open access: yesIACR Transactions on Symmetric Cryptology, 2021
This work investigates a generic way of combining two very effective and well-studied cryptanalytic tools, proposed almost 18 years apart, namely the boomerang attack introduced by Wagner in FSE 1999 and the yoyo attack by Ronjom et al. in Asiacrypt 2017.
Mostafizar Rahman   +2 more
doaj   +1 more source

Robust Attack Graph Generation

open access: yes, 2022
We present a method to learn automaton models that are more robust to input modifications. It iteratively aligns sequences to a learned model, modifies the sequences to their aligned versions, and re-learns the model. Automaton learning algorithms are typically very good at modeling the frequent behavior of a software system.
Mouwen, Dennis   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy