Results 81 to 90 of about 4,920 (187)

Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices

open access: yesIEEE Access, 2019
Attribute-based encryption (ABE) mechanism on lattices can against quantum attack and guarantees fine-grained access control of encrypted data, and it has been widely used in cloud computing and privacy protection.
Yuan Liu   +3 more
doaj   +1 more source

Digital Signature Schemes Based on Hash Functions [PDF]

open access: yes, 2017
Cryptographers and security experts around the world have been awakened to the reality that one day (potentially soon) large-scale quantum computers may be available.
Lafrance, Philip
core  

Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing

open access: yesIACR Transactions on Symmetric Cryptology
The Nostradamus attack was originally proposed as a security vulnerability for a hash function by Kelsey and Kohno at EUROCRYPT 2006. It requires the attacker to commit to a hash value y of an iterated hash function H.
Xiaoyang Dong   +4 more
doaj   +1 more source

A Meaningful MD5 Hash Collision Attack [PDF]

open access: yes, 2006
It is now proved by Wang et al., that MD5 hash is no more secure, after they proposed an attack that would generate two different messages that gives the same MD5 sum. Many conditions need to be satisfied to attain this collision.
Kashyap, Narayana D.
core   +1 more source

SAT-Based Space Partitioning and Applications to Ascon-Hash256 Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology
We introduce an efficient SAT-based space partitioning technique that enables systematic exploration of large search spaces in cryptanalysis. The approach divides complex search spaces into manageable subsets through combinatorial necklace generation ...
Guozhen Liu   +4 more
doaj   +1 more source

Linear Cancellations in the MitM Attacks on Sponge Functions

open access: yesIACR Transactions on Symmetric Cryptology
At EUROCRYPT 2023, Qin et al. proposed the MitM attack framework on sponge functions by separating the message bits into two sets of neutral bits.
Lingyue Qin   +5 more
doaj   +1 more source

Quantum algorithms for hash preimage attacks

open access: yesQuantum Engineering, 2020
Ping Wang   +3 more
openaire   +1 more source

On the Security of Split-and-Lookup-Based ZK-Friendly Primitives

open access: yesIACR Transactions on Symmetric Cryptology
Arithmetization-Oriented hash functions are optimized for their verification to be efficiently implemented within various proof systems, but they are often too slow when evaluated on a regular machine.
Antoine Bak, Léo Perrin
doaj   +1 more source

Home - About - Disclaimer - Privacy