搜索结果: 1-5 共查到“军事学 Practical Attack”相关记录5条 . 查询时间(0.156 秒)
A Tale of Three Signatures: practical attack of ECDSA with wNAF
ECDSA lattice techniques cryptanalysis
font style='font-size:12px;'>
2019/7/25
Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this p...
Practical Attack on RaCoSS-R
NIST PQC post-quantum digital signatures cryptanalysis
font style='font-size:12px;'>
2018/11/16
RaCoSS is a signature scheme based on the syndrome decoding problem over the random linear code and proposed by Fukushima, Roy, Xu, Kiyomoto, Morozov, and Takagi. This scheme is cryptanalyzed Bernstei...
Nonlinear Invariant Attack --Practical Attack on Full SCREAM, iSCREAM, and Midori64
Nonlinear invariant attack Boolean function Ciphertext-only attack
font style='font-size:12px;'>
2016/7/29
In this paper we introduce a new type of attack, called nonlinear invariant attack.
As application examples, we present new attacks that are able to distinguish the full versions
of the (tweakable) ...
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
implementation RC4 cryptanalysis
font style='font-size:12px;'>
2016/1/6
The HIVE hidden volume encryption system was proposed by Blass et al.
at ACM-CCS 2014. Even though HIVE has a security proof, this paper demonstrates
an attack on its implementation that breaks the ...
A Practical Attack on the Root Problem in Braid Groups
Practical Attack Root Problem Braid Groups
font style='font-size:12px;'>
2009/3/19
Using a simple heuristic approach to the root problem in braid
groups, we show that cryptographic parameters proposed in this context must
be considered as insecure. In our experiments we can, often...