军事学 >>> 军事学 >>> 军队指挥学 >>> 密码学 >>>
搜索结果: 1-15 共查到密码学 collision attack相关记录32条 . 查询时间(0.09 秒)
RIPEMD-160 is a hash function published in 1996, which shares similarities with other hash functions designed in this time-period like MD4, MD5 and SHA-1. However, for RIPEMD-160, no (semi-free-start)...
Recovering keys efficiently from far beyond exhaustible candidate spaces is a meaningful but very challenging topic in Side-Channel Attacks (SCA). Recent methods often utilize collision optimizations ...
Efficient Collision Attack Frameworks for RIPEMD-160     RIPEMD-160  collision  hash function       font style='font-size:12px;'> 2018/7/9
In this paper, we re-consider the connecting techniques to find colliding messages, which is achieved by connecting the middle part with the initial part. To obtain the best position of middle part, w...
Improved Collision Attack on Reduced RIPEMD-160     RIPEMD-160  collision  hash function       font style='font-size:12px;'> 2018/5/28
In this paper, we propose a new cryptanalysis method to mount collision attack on RIPEMD-160. Firstly, we review two existent cryptanalysis methods to mount (semi-free-start) collision attack on MD-SH...
Fast Near Collision Attack on the Grain v1 Stream Cipher     Cryptanalysis  Stream ciphers  Grain       font style='font-size:12px;'> 2018/2/9
Modern stream ciphers often adopt a large internal state to resist various attacks, where the cryptanalysts have to deal with a large number of variables when mounting state recovery attacks. In this ...
Entropy Reduction for the Correlation-Enhanced Power Analysis Collision Attack     AES  Side Channel Attacks       font style='font-size:12px;'> 2017/11/13
Side Channel Attacks are an important attack vector on secure AES implementations. The Correlation-Enhanced Power Analysis Collision Attack by Moradi et al. [13] is a powerful collision attack that ex...
Collision Attack on GRINDAHL     GRINDAHL  RIJNDAEL  hash functions       font style='font-size:12px;'> 2016/3/18
Hash functions have been among the most scrutinized cryptographic primitives in the previous decade, mainly due to the cryptanalysis breakthroughs on MD-SHA family and the NIST SHA3 competition that f...
Collision Attack on 5 Rounds of Gr鴖tl     hash functions  SHA-3 candidate  Gr鴖tl       font style='font-size:12px;'> 2016/1/23
In this article, we describe a novel collision attack for up to 5 rounds of the Gr鴖tl hash function. This significantly improves upon the best previously published results on 3 rounds. By using a ne...
The parallel algorithm and its implementation for performing a single-block collision attack on MD5 are described. The algorithm is implemented as MPI program based upon the source code of Dr Marc S...
In this work, we apply the sliced biclique cryptanalysis technique to show 8-round collision attack on a hash function H based on 4-branch, Type-2 Generalized Feistel Network (Type-2 GFN). This attack...
Fast Collision Attack on MD5     Hash Function  MD5 Differential Cryptanalysis  Collision Attack  Single-Block Collision       font style='font-size:12px;'> 2013/4/18
We presented the first single block collision attack on MD5 with complexity of $2^{47}$ MD5 compressions and posted the challenge for another completely new one in 2010. Last year, Stevens presented a...
Practical collision attack on 40-step RIPEMD-128     secret-key cryptography / hash function       font style='font-size:12px;'> 2013/4/18
RIPEMD-128 is an ISO/IEC standard cryptographic hash function proposed in 1996 by Dobbertin, Bosselaers and Preneel. There are two different and independent parallel lines called $line1$ operation and...
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256     Hash function  Skein  SHA-3       font style='font-size:12px;'> 2012/3/29
The Hash function Skein is one of the 5 finalists of NIST SHA-3 competition. It is designed based on the threefish block cipher and it only uses three primitive operations: modular addition, rotation ...
This paper studies two types of attacks on the hash function Shabal. The first attack is a low-weight pseudo collision attack on Shabal. Since a pseudo collision attack is trivial for Shabal, we focus...
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, has made further rese...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...