نتایج جستجو برای: attack construction

تعداد نتایج: 287518  

Journal: :Advances in social science, education and humanities research 2022

Journal: :IACR Cryptology ePrint Archive 2003
Mihir Bellare Tadayoshi Kohno

Textbooks tell us that a birthday attack on a hash function h with range size r requires r trials (hash computations) to find a collision. But this is quite misleading, being true only if h is regular, meaning all points in the range have the same number of pre-images under h; if h is not regular, fewer trials may be required. But how much fewer? This paper addresses this question by introducin...

Journal: :Dalton transactions 2009
Andreas Franken Thomas D McGrath F Gordon A Stone

Intramolecular hydroxyl attack upon iron-coordinated nitriles in a {closo-2,1,10-FeC2B7} system forms imidates that allow construction of a tetra-cluster {FeC2B7}-{C2Co2}-{C2Co2}-{FeC2B7} molecule.

2006
Praveen Gauravaram William Millan Ed Dawson Kapali Viswanathan

Recently multi-block collision attacks (MBCA) were found on the Merkle-Damg̊ard (MD)-structure based hash functions MD5, SHA-0 and SHA-1. In this paper, we introduce a new cryptographic construction called 3C devised by enhancing the MD construction. We show that the 3C construction is at least as secure as the MD construction against single-block and multi-block collision attacks. This is the f...

2011
Elena Andreeva Bart Mennink

This paper deals with definitional aspects of the herding attack of Kelsey and Kohno, and investigates the provable security of several hash functions against herding attacks. Firstly, we define the notion of chosen-target-forced-midfix (CTFM) as a generalization of the classical herding (chosen-target-forced-prefix) attack to the cases where the challenge message is not only a prefix but may a...

2010
Liting Zhang Wenling Wu Peng Wang Lei Zhang Shuang Wu Bo Liang

Almost all current block-cipher-based MACs reduce their security to the pseudorandomness of their underlying block ciphers, except for a few of them to the unpredictability, a strictly weaker security notion than pseudorandomness. However, the latter MACs offer relatively low efficiency. In this paper, we investigate the feasibility of constructing rate-1 MACs from related-key unpredictable blo...

Journal: :IACR Cryptology ePrint Archive 2007
Kazuhiro Suzuki Kaoru Kurosawa

The hash function HAVAL is an Australian extension of well known Merkle-Damg̊ard hash functions such as MD4 and MD5. It has three variants, 3-, 4and 5-pass HAVAL. On 3-pass HAVAL, the best known attack finds a collision pair with 2 computations of the compression function. To find k collision pairs, it requires 2k computations. In this paper, we present a better collision attack on 3-pass HAVAL,...

2006
Bessie C. Hu Duncan S. Wong Zhenfeng Zhang Xiaotie Deng

Certificateless cryptography involves a Key Generation Center (KGC) which issues a partial key to a user and the user also independently generates an additional public/secret key pair in such a way that the KGC who knows only the partial key but not the additional secret key is not able to do any cryptographic operation on behalf of the user; and a third party who replaces the public/secret key...

2014
Igor Kotenko Andrey Chechulin

The paper suggests an approach to network attack modeling and security evaluation which is realized in advanced Security Information and Event Management (SIEM) systems. It is based on modeling of computer network and malefactors’ behaviors, building attack graphs, processing current alerts for real-time adjusting of particular attack graphs, calculating different security metrics and providing...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید