Results 81 to 90 of about 4,920 (187)
Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices
Attribute-based encryption (ABE) mechanism on lattices can against quantum attack and guarantees fine-grained access control of encrypted data, and it has been widely used in cloud computing and privacy protection.
Yuan Liu +3 more
doaj +1 more source
Digital Signature Schemes Based on Hash Functions [PDF]
Cryptographers and security experts around the world have been awakened to the reality that one day (potentially soon) large-scale quantum computers may be available.
Lafrance, Philip
core
Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
The Nostradamus attack was originally proposed as a security vulnerability for a hash function by Kelsey and Kohno at EUROCRYPT 2006. It requires the attacker to commit to a hash value y of an iterated hash function H.
Xiaoyang Dong +4 more
doaj +1 more source
A Meaningful MD5 Hash Collision Attack [PDF]
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core +1 more source
SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu +4 more
doaj +1 more source
Linear Cancellations in the MitM Attacks on Sponge Functions
At EUROCRYPT 2023, Qin et al. proposed the MitM attack framework on sponge functions by separating the message bits into two sets of neutral bits.
Lingyue Qin +5 more
doaj +1 more source
Quantum algorithms for hash preimage attacks
Ping Wang +3 more
openaire +1 more source
On the Security of Split-and-Lookup-Based ZK-Friendly Primitives
Arithmetization-Oriented hash functions are optimized for their verification to be efficiently implemented within various proof systems, but they are often too slow when evaluated on a regular machine.
Antoine Bak, Léo Perrin
doaj +1 more source
Replication data for: Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
Zhenzhen Bao +4 more
openalex +1 more source
Post-Quantum Secure Identity-Based Proxy Blind Signature Scheme on a Lattice. [PDF]
Li F, Yang M, Song Z, Wang P, Li G.
europepmc +1 more source

