搜索结果: 1-15 共查到“军队指挥学 Collision Attack”相关记录32条 . 查询时间(0.072 秒)
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160
hash function RIPEMD-160 freedom degree utilization
font style='font-size:12px;'>
2019/6/10
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions designed in this time-period like MD4, MD5 and SHA-1. However, for RIPEMD-160, no (semi-free-start)...
Full Collision Attack: Pushing the Limits of Exhaustible Key Spaces
FCA full collision group collision attack
font style='font-size:12px;'>
2019/1/9
Recovering keys efficiently from far beyond exhaustible candidate spaces is a meaningful but very challenging topic in Side-Channel Attacks (SCA). Recent methods often utilize collision optimizations ...
Efficient Collision Attack Frameworks for RIPEMD-160
RIPEMD-160 collision hash function
font style='font-size:12px;'>
2018/7/9
In this paper, we re-consider the connecting techniques to find colliding messages, which is achieved by connecting the middle part with the initial part. To obtain the best position of middle part, w...
Improved Collision Attack on Reduced RIPEMD-160
RIPEMD-160 collision hash function
font style='font-size:12px;'>
2018/5/28
In this paper, we propose a new cryptanalysis method to mount collision attack on RIPEMD-160. Firstly, we review two existent cryptanalysis methods to mount (semi-free-start) collision attack on MD-SH...
Fast Near Collision Attack on the Grain v1 Stream Cipher
Cryptanalysis Stream ciphers Grain
font style='font-size:12px;'>
2018/2/9
Modern stream ciphers often adopt a large internal state to resist various attacks, where the cryptanalysts have to deal with a large number of variables when mounting state recovery attacks. In this ...
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack
AES Side Channel Attacks
font style='font-size:12px;'>
2017/11/13
Side Channel Attacks are an important attack vector on secure AES implementations. The Correlation-Enhanced Power Analysis Collision Attack by Moradi et al. [13] is a powerful collision attack that ex...
Collision Attack on GRINDAHL
GRINDAHL RIJNDAEL hash functions
font style='font-size:12px;'>
2016/3/18
Hash functions have been among the most scrutinized cryptographic primitives in the previous decade, mainly due to the cryptanalysis breakthroughs on MD-SHA family and the NIST SHA3 competition that f...
Collision Attack on 5 Rounds of Gr鴖tl
hash functions SHA-3 candidate Gr鴖tl
font style='font-size:12px;'>
2016/1/23
In this article, we describe a novel collision attack for up to 5 rounds of the Gr鴖tl hash function. This significantly improves upon the best previously published results on 3 rounds. By using a ne...
An algorithm for MD5 single-block collision attack using high-performance computing cluster
hash functions MD5 computing cluster
font style='font-size:12px;'>
2016/1/6
The parallel algorithm and its implementation for performing a single-block collision attack on
MD5 are described. The algorithm is implemented as MPI program based upon the source code of Dr Marc
S...
Collision Attack on 4-branch, Type-2 GFN based Hash Functions using Sliced Biclique Cryptanalysis Technique
Sliced Biclique cryptanalysis hash functions collision attack
font style='font-size:12px;'>
2016/1/3
In this work, we apply the sliced biclique cryptanalysis technique to show 8-round collision attack on a hash function H based on 4-branch, Type-2 Generalized Feistel Network (Type-2 GFN). This attack...
Fast Collision Attack on MD5
Hash Function MD5 Differential Cryptanalysis Collision Attack Single-Block Collision
font style='font-size:12px;'>
2013/4/18
We presented the first single block collision attack on MD5 with complexity of $2^{47}$ MD5 compressions and posted the challenge for another completely new one in 2010. Last year, Stevens presented a...
Practical collision attack on 40-step RIPEMD-128
secret-key cryptography / hash function
font style='font-size:12px;'>
2013/4/18
RIPEMD-128 is an ISO/IEC standard cryptographic hash function proposed in 1996 by Dobbertin, Bosselaers and Preneel. There are two different and independent parallel lines called $line1$ operation and...
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256
Hash function Skein SHA-3
font style='font-size:12px;'>
2012/3/29
The Hash function Skein is one of the 5 finalists of NIST SHA-3 competition. It is designed based on the threefish block cipher and it only uses three primitive operations: modular addition, rotation ...
Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512
Shabal low-weight pseudo collision attack preimage attack guess-and-determine technique SHA-3 competition
font style='font-size:12px;'>
2010/8/17
This paper studies two types of attacks on the hash function Shabal. The first attack is a low-weight pseudo collision attack on Shabal. Since a pseudo collision attack is trivial for Shabal, we focus...
Correlation-Enhanced Power Analysis Collision Attack
implementation Side Channel Analysis Collision Attack DPA Masking AES Hardware Implementation
font style='font-size:12px;'>
2010/7/13
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, has made further rese...