搜索结果: 1-10 共查到“军事学 Practical Attacks”相关记录10条 . 查询时间(0.156 秒)
In this paper we investigate the security of 5-round AES against two different attacks in an adaptive setting. We present a practical key-recovery attack on 5-round AES with a secret s-box that requir...
Practical Attacks on Relational Databases Protected via Searchable Encryption
searchable symmetric encryption relational databases inference attacks
2018/8/2
Searchable symmetric encryption (SSE) schemes are commonly proposed to enable search in a protected unstructured documents such as email archives or any set of sensitive text files. However, some SSE ...
Practical attacks against the Walnut digital signature scheme
NIST PQC post-quantum digital signatures cryptanalysis
2018/4/9
Recently, NIST started the process of standardizing quantum- resistant public-key cryptographic algorithms. WalnutDSA, the subject of this paper, is one of the 20 proposed signature schemes that are b...
Towards Practical Attacks on Argon2i and Balloon Hashing
Data Independent Memory Hard Functions Argon2i Attacks
2016/12/10
The algorithm Argon2i-B of Biryukov, Dinu and Khovratovich is currently being considered by the IRTF (Internet Research Task Force) as a new de-facto standard for password hashing. An older version (A...
Practical Attacks on the Round-reduced PRINCE
PRINCE lightweight cryptography integral cryptanalysis
2016/1/3
The PRINCE cipher is the result of a cooperation between the Technical University of
Denmark (DTU), NXP Semiconductors and the Ruhr University Bochum. The cipher was designed
to reach an extremely l...
NESHA-256 is a cryptographic hash function designed by
Esmaeili et al. and presented at WCC '09. We show that NESHA-256 is
highly insecure.
In this paper, we describe two attacks on IEEE 802.11 based wireless
LANs[2]. The first attack is an improved key recovery attack on WEP,
which reduces the average number of packets an attacker has ...
HB and HB+ are a shared-key authentication protocol designed for
low-cost devices such as RFID tags. It was proposed by Juels andWeis at Crypto
2005. The security of the protocol relies on the “lear...
Practical Attacks on Digital Signatures Using MD5 Message Digest
collision hash function MD5
2009/4/3
We use the knowledge of the single MD5 collision published by
Wang et al. [2] to show an example of a pair of binary self-extract packages
with equal MD5 checksums, whereas resulting extracted contr...
Modified Parameter Attacks: Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures
Modified Parameter Attacks Practical Attacks CCA2 Secure Cryptosystems Countermeasures
2009/4/3
We introduce the concept of Modi¯ed Parameter Attacks, a
natural extension of the idea of Adapative Chosen Ciphertext Attacks
(CCA2) under which some CCA2 secure systems can be shown to be
ins...