Results 21 to 30 of about 257,742 (291)
Quantum Free-Start Collision Attacks on Double Block Length Hashing with Round-Reduced AES-256
Recently, Hosoyamada and Sasaki (EUROCRYPT 2020), and Xiaoyang Dong et al. (ASIACRYPT 2020) proposed quantum collision attacks against AES-like hashing modes AES-MMO and AES-MP.
Amit Kumar Chauhan +2 more
doaj +1 more source
Cyclic Bayesian Attack Graphs: A Systematic Computational Approach
Attack graphs are commonly used to analyse the security of medium-sized to large networks. Based on a scan of the network and likelihood information of vulnerabilities, attack graphs can be transformed into Bayesian Attack Graphs (BAGs).
Mace, John +3 more
core +1 more source
Simply Good: A Defence of the Principia [PDF]
Moore's moral programme is increasingly unpopular. Judith Jarvis Thomson's attack has been especially influential; she says the Moorean project fails because ‘there is no such thing as goodness’. I argue that her objection does not succeed: while Thomson
Tucker, Miles
core +1 more source
A deep learning‐based attack on text CAPTCHAs by using object detection techniques
Text‐based CAPTCHAs have been widely deployed by many popular websites, and many have been attacked. However, most previous cracks were based on classification algorithms that typically rely on a series of preprocessing operations or on many training ...
Jiawei Nian +3 more
doaj +1 more source
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
We show generic attacks on unbalanced Feistel ciphers based on the meet-in-the-middle technique. We analyze two general classes of unbalanced Feistel structures, namely contracting Feistels and expanding Feistels.
Jian Guo +3 more
doaj +1 more source
Single-Trace Attacks on Keccak
Since its selection as the winner of the SHA-3 competition, Keccak, with all its variants, has found a large number of applications. It is, for instance, a common building block in schemes submitted to NIST’s post-quantum cryptography project. In many of
Matthias J. Kannwischer +2 more
doaj +1 more source
Quantum rebound attacks on reduced-round ARIA-based hash functions
ARIA is a block cipher proposed by Kwon et al. at ICISC 2003 that is widely used as the national standard block cipher in the Republic of Korea. Herein, we identify some flaws in the quantum rebound attack on seven-round ARIA-DM proposed by Dou et al ...
Seungjun Baek, Jongsung Kim
doaj +1 more source
PudgyTurtle Mode Resists Bit-Flipping Attacks
Cryptosystems employing a synchronous binary-additive stream cipher are susceptible to a generic attack called ’bit-flipping’, in which the ciphertext is modified to decrypt into a fraudulent message.
David A. August, Anne C. Smith
doaj +1 more source
This work investigates a generic way of combining two very effective and well-studied cryptanalytic tools, proposed almost 18 years apart, namely the boomerang attack introduced by Wagner in FSE 1999 and the yoyo attack by Ronjom et al. in Asiacrypt 2017.
Mostafizar Rahman +2 more
doaj +1 more source
Robust Attack Graph Generation
We present a method to learn automaton models that are more robust to input modifications. It iteratively aligns sequences to a learned model, modifies the sequences to their aligned versions, and re-learns the model. Automaton learning algorithms are typically very good at modeling the frequent behavior of a software system.
Mouwen, Dennis +2 more
openaire +2 more sources

