Zobrazeno 1 - 10
of 1 006
pro vyhledávání: '"collision attack"'
Publikováno v:
IET Information Security, Vol 17, Iss 4, Pp 647-663 (2023)
Abstract Neutral bits and boomerangs are key techniques for accelerating collision search in SHA‐1 attacks. The current acceleration techniques for SHA‐1 near‐collision attacks are reviewed and a generic search framework for neutral bits and bo
Externí odkaz:
https://doaj.org/article/228c20665d3442bd8a540effc807c8d6
Publikováno v:
Heliyon, Vol 10, Iss 5, Pp e26119- (2024)
Lightweight cryptography algorithms are a class of ciphers designed to protect data generated and transmitted by the Internet of Things. They typically have low requirements in terms of storage space and power consumption, and are well-suited for res
Externí odkaz:
https://doaj.org/article/658a1432f62249b685108a1c6bf3fd8d
Autor:
Marvin Staib, Amir Moradi
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2023, Iss 3 (2023)
With the breakthrough of Deep Neural Networks, many fields benefited from its enormously increasing performance. Although there is an increasing trend to utilize Deep Learning (DL) for Side-Channel Analysis (SCA) attacks, previous works made specific
Externí odkaz:
https://doaj.org/article/246fafb258454271a8a8950cc866dd06
Publikováno v:
IEEE Access, Vol 10, Pp 112472-112486 (2022)
In modern cryptography, hash functions are considered as one of the key components for secure communication. They play a vital role in a wide range of applications such as ensuring the authentication and integrity of the data, in forensic investigati
Externí odkaz:
https://doaj.org/article/7f45e19a15f14e7290f33e7035b7d6ec
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 3 (2022)
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. National Institute of Standards and Technology (NIST) in 2012 as the next generation of Secure Hash Algorithm (SHA-3). Due to its theoretical and practica
Externí odkaz:
https://doaj.org/article/bf271320c8604a4a9e452770be027787
Autor:
Seungkwang Lee, Myungchul Kim
Publikováno v:
IEEE Access, Vol 8, Pp 90992-91004 (2020)
White-box cryptography is a software technique to protect secret keys of cryptographic algorithms from attackers who have access to memory. By adapting techniques of differential power analysis to computation traces consisting of runtime information,
Externí odkaz:
https://doaj.org/article/c8943d00df204f4c97a6ab35aea74487
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 4 (2021)
In this paper, we propose a novel key recovery attack against secure ECDSA signature generation employing regular table-based scalar multiplication. Our attack exploits novel leakage, denoted by collision information, which can be constructed by iter
Externí odkaz:
https://doaj.org/article/988dcde486384eb8ac8cecb5996d3c2f