Search

Your search keyword '"Collision attack"' showing total 942 results

Search Constraints

Start Over You searched for: Descriptor "Collision attack" Remove constraint Descriptor: "Collision attack"
942 results on '"Collision attack"'

Search Results

1. Collision Attacks on Hashing Modes of Areion

3. A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH

4. High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA

5. Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher.

6. Improved 2-round collision attack on IoT hash standard ASCON-HASH

9. Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP

10. Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures

11. Search framework for neutral bits and boomerangs in SHA‐1 collision attacks

12. Improved attacks against reduced-round Whirlwind.

13. 结合 EDCA和 CPA的容错双向选择攻击.

14. Search framework for neutral bits and boomerangs in SHA‐1 collision attacks.

15. Deep self-learning based dynamic secret key generation for novel secure and efficient hashing algorithm.

16. Cryptanalysis of Two White-Box Implementations of the SM4 Block Cipher

17. Near and Far Collision Attack on Masked AES

18. Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks

19. Quantum Collision Attacks on Reduced SHA-256 and SHA-512

20. Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications

21. Enhanced Side-Channel Analysis on ECDSA Employing Fixed-Base Comb Method.

22. Finding Collisions against 4-Round SHA-3-384 in Practical Time

24. Efficient Collision Attack Frameworks for RIPEMD-160

25. Cryptanalysis of a white‐box SM4 implementation based on collision attack.

26. Improvement on a Masked White-Box Cryptographic Implementation

27. Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries

28. Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks.

29. The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks.

30. An Efficient Collision Power Attack on AES Encryption in Edge Computing

31. Algebraic Collision Attacks on Keccak

32. The First Collision for Full SHA-1

33. WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction

34. Clustering Collision Power Attack on RSA-CRT.

35. Cryptanalysis of the Legendre PRF and Generalizations

36. A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks.

37. Trick or Tweak: On the (In)security of OTR’s Tweaks

38. Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order

39. Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security

40. Group Verification Based Multiple-Differential Collision Attack

41. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices : Overview of the ERC Project CRASH, Part I (Invited Talk)

42. Collision Attacks on CAESAR Second-Round Candidate: ELmD

45. Branching Heuristics in Differential Collision Search with Applications to SHA-512

46. Collision Attack on 5 Rounds of Grøstl

47. Automatically Checking Commitment Protocols in ProVerif without False Attacks

48. Two Operands of Multipliers in Side-Channel Attack

49. Combining Leakage-Resilient PRFs and Shuffling : Towards Bounded Security for Small Embedded Devices

50. Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique

Catalog

Books, media, physical & digital resources