Results 21 to 30 of about 518,524 (183)

Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC

open access: yesIET Information Security, 2021
Joltik‐BC is an internal tweakable block cipher of the authenticated encryption algorithm Joltik, which was a second‐round finalist in the CAESAR competition.
Manman Li, Shaozhen Chen
doaj   +1 more source

Proposing a secure component-based-application logic and system’s integration testing approach [PDF]

open access: yes, 2019
Software engineering moved from traditional methods of software enterprise applications to com-ponent based development for distributed system’s applications. This new era has grown up forlast few years, with component-based methods, for design and rapid
Nabi, Faisal   +2 more
core   +2 more sources

Meet-in-the-Middle Attacks on SHA-3 Candidates [PDF]

open access: yes, 2009
We present preimage attacks on the SHA-3 candidates Boole, EnRUPT, Edon-R, and Sarmal, which are found to be vulnerable against a meet-in-the-middle attack. The idea is to invert (or partially invert) the compression function and to exploit its non-randomness. To launch an attack on a large internal state we manipulate the message blocks to be injected
Dmitry Khovratovich   +2 more
openaire   +1 more source

Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding

open access: yesTongxin xuebao, 2014
The security of SM3 hash function was revaluated by using the meet-in-the-middle attack. The preimage and pseudo-collision attack on 29-step SM3 hash function (from the 1-st step) with padding was presented.
Gao-li WANG, Yan-zhao SHEN
doaj   +2 more sources

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

Analysis and Correction of the Attack against the LPN-Problem Based Authentication Protocols

open access: yesMathematics, 2021
This paper reconsiders a powerful man-in-the-middle attack against Random-HB# and HB# authentication protocols, two prominent representatives of the HB family of protocols, which are built based on the Learning Parity in Noise (LPN) problem.
Siniša Tomović   +2 more
doaj   +1 more source

3-subset meet-in-the-middle attack on block cipher TWIS

open access: yesTongxin xuebao, 2014
To do further analysis of the security of lightweight block cipher TWIS, 3-subset meet-in-the-middle attack was applied to 10-round TWIS without the final whitening.
Ya-fei ZHENG, Hong-ru WEI
doaj   +2 more sources

Grayscale Image Authentication using Neural Hashing

open access: yes, 2016
Many different approaches for neural network based hash functions have been proposed. Statistical analysis must correlate security of them. This paper proposes novel neural hashing approach for gray scale image authentication.
Kutlu, Yakup, Yayık, Apdullah
core   +2 more sources

A Relentless War: America, Israel, and the Fight Against Terrorism [PDF]

open access: yes, 2020
For Israel, terrorism has plagued the nation since its beginning. Terrorism rears its ugly head in a variety of ways and for a variety of reasons; however, in both the United States and Israel, Islamic extremism has presented itself as the largest threat.
Keener, Elyse
core   +1 more source

Improved MITM Cryptanalysis on Streebog

open access: yesIACR Transactions on Symmetric Cryptology, 2022
At ASIACRYPT 2012, Sasaki et al. introduced the guess-and-determine approach to extend the meet-in-the-middle (MITM) preimage attack. At CRYPTO 2021, Dong et al.
Jialiang Hua   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy