942 results on '"Collision attack"'
Search Results
2. Collision-Based Attacks on White-Box Implementations of the AES Block Cipher
3. A Closer Look at the S-Box: Deeper Analysis of Round-Reduced ASCON-HASH
4. High-Order Collision Attack Vulnerabilities in Montgomery Ladder Implementations of RSA
5. Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher.
6. Improved 2-round collision attack on IoT hash standard ASCON-HASH
7. Cryptanalysis of Two White-Box Implementations of the CLEFIA Block Cipher
8. Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal Differentials
9. Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP
10. Related-Key Differential Cryptanalysis of GMiMC Used in Post-Quantum Signatures
11. Search framework for neutral bits and boomerangs in SHA‐1 collision attacks
12. Improved attacks against reduced-round Whirlwind.
13. 结合 EDCA和 CPA的容错双向选择攻击.
14. Search framework for neutral bits and boomerangs in SHA‐1 collision attacks.
15. Deep self-learning based dynamic secret key generation for novel secure and efficient hashing algorithm.
16. Cryptanalysis of Two White-Box Implementations of the SM4 Block Cipher
17. Near and Far Collision Attack on Masked AES
18. Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks
19. Quantum Collision Attacks on Reduced SHA-256 and SHA-512
20. Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications
21. Enhanced Side-Channel Analysis on ECDSA Employing Fixed-Base Comb Method.
22. Finding Collisions against 4-Round SHA-3-384 in Practical Time
23. A comprehensive review of the security flaws of hashing algorithms
24. Efficient Collision Attack Frameworks for RIPEMD-160
25. Cryptanalysis of a white‐box SM4 implementation based on collision attack.
26. Improvement on a Masked White-Box Cryptographic Implementation
27. Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries
28. Multiple-Differential Mechanism for Collision-Optimized Divide-and-Conquer Attacks.
29. The Science of Guessing in Collision-Optimized Divide-and-Conquer Attacks.
30. An Efficient Collision Power Attack on AES Encryption in Edge Computing
31. Algebraic Collision Attacks on Keccak
32. The First Collision for Full SHA-1
33. WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction
34. Clustering Collision Power Attack on RSA-CRT.
35. Cryptanalysis of the Legendre PRF and Generalizations
36. A Lightweight Detection Algorithm For Collision-Optimized Divide-and-Conquer Attacks.
37. Trick or Tweak: On the (In)security of OTR’s Tweaks
38. Robust and One-Pass Parallel Computation of Correlation-Based Attacks at Arbitrary Order
39. Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security
40. Group Verification Based Multiple-Differential Collision Attack
41. Towards Fair and Efficient Evaluations of Leaking Cryptographic Devices : Overview of the ERC Project CRASH, Part I (Invited Talk)
42. Collision Attacks on CAESAR Second-Round Candidate: ELmD
43. Implementation and Performance Analysis of Enhanced SHA-192
44. Password Encryption and Storage for Everyone
45. Branching Heuristics in Differential Collision Search with Applications to SHA-512
46. Collision Attack on 5 Rounds of Grøstl
47. Automatically Checking Commitment Protocols in ProVerif without False Attacks
48. Two Operands of Multipliers in Side-Channel Attack
49. Combining Leakage-Resilient PRFs and Shuffling : Towards Bounded Security for Small Embedded Devices
50. Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.