Results 31 to 40 of about 518,524 (183)
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
The Nostradamus attack was originally proposed as a security vulnerability for a hash function by Kelsey and Kohno at EUROCRYPT 2006. It requires the attacker to commit to a hash value y of an iterated hash function H.
Xiaoyang Dong +4 more
doaj +1 more source
Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions
In this paper, we present improved meet-in-the-middle key-recovery attacks on six-round and seven-round Feistel constructions separately. The attacks are based on Guo et al.'s work which appends one round to the five-round distinguisher to attack the six-
Shibin Zhao +4 more
doaj +1 more source
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
Kiasu-BC algorithm is an internal tweakable block cipher of authenticated encryption algorithm Kiasu as one of first-round candidates in the CAESAR competition.The precomputation complexity is reduced by utilizing the freedom of the tweak and the ...
Manman LI, Shaozhen CHEN
doaj +2 more sources
Improved Cryptanalysis of Reduced-Version QARMA-64/128
QARMA is a new tweakable block cipher used for memory encryption, the generation of short tags and the construction of the keyed hash functions in future.
Ya Liu +5 more
doaj +1 more source
Israel/Palestine/Lebanon: Climbing Out of the Abyss [PDF]
The Middle East is immersed in its worst crisis in years following the capture of three Israeli soldiers by the Palestinian Islamic Resistance Movement (Hamas) and Lebanese Party of God (Hizbollah) in late June 2006 and early July, Israel's comprehensive
core
Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems [PDF]
Industrial Control Systems (ICS) and SCADA (Supervisory Control And Data Acquisition) applications monitor and control a wide range of safety-related functions.
Evangelopoulou, Maria +2 more
core +2 more sources
New attacks against reduced Rijndael‐160
The first 9‐round meet‐in‐the‐middle (MITM) attack and improved 8‐round impossible differential (ID) attacks on Rijndael‐160 are studied here. For the first 9‐round MITM attack, a new effective attack path is explored by using the generalised δ‐set and ...
Xiaoli Dong, Yongzhuang Wei
doaj +1 more source
Framing-effects approach: A theoretical and methodological critique [PDF]
The article deals with research on framing effects. First, I will start with classifying different approaches on framing. Subsequently, I will provide a definition of the concepts of frame, schema and framing, expand on framing research conducted so far -
Bertram Scheufele, McCombs
core +1 more source
Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
A preimage attack on DHA-256 hash function reduced to 37-round and a pseudo collision attack on the func-tion reduced to 39-round were proposed respectively.Based on the meet-in-the-middle attack,the Biclique technique was used to improve the preimage ...
Jian ZOU +3 more
doaj +2 more sources
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security.
Hanzo, Lajos +3 more
core +1 more source

