نتایج جستجو برای: attack resistance

تعداد نتایج: 452323  

2012
Fanbao Liu Tao Xie Changxiang Shen

In this paper, we propose an efficient method to break H2-MAC, by using a generalized birthday attack to recover the equivalent key, under the assumption that the underlying hash function is secure (collision resistance). We can successfully recover the equivalent key of H2-MAC in about 2n/2 on-line MAC queries and 2n/2 off-line hash computations with great probability. This attack shows that t...

Journal: :CoRR 2013
Haiyan Sun Qiaoyan Wen Hua Zhang Zhengping Jin Wenmin Li

Recently, two certificateless three-party authenticated key agreement protocols were proposed, and both protocols were claimed they can meet the desirable security properties including forward security, key compromise impersonation resistance and so on. Through cryptanalysis, we show that one neither meets forward security and key compromise impersonation resistance nor resists an attack by an ...

2008
Jing Pan Jerry den Hartog Erik P. de Vink

Differential power analysis (DPA) is a strong attack upon cryptographic devices such as smartcards. Correlation power analysis (CPA) is a specific form of DPA where the Hamming-weight and the correlation coefficient are employed. In this paper we investigate the intrinsic vulnerability of the individual operations that are targeted in DPA attacks. We find that under the typical circumstances, t...

2012
Belmeguenaï Aïssa

In this work a new algorithm for encryption image is introduced. This algorithm makes it possible to cipher and decipher images by guaranteeing a maximum security. The algorithm introduced is based on stream cipher with nonlinear filtering function. The Boolean function used in this algorithm is resilient function satisfying all the cryptographic criteria necessary carrying out the best possibl...

Journal: :IACR Cryptology ePrint Archive 2009
Chuan-Kun Wu

The correlation immunity is known as an important cryptographic measure of a Boolean function with respect to its resist against the correlation attack. This paper generalizes the concept of correlation immunity to be of a fractional value, called fractional correlation immunity, which is a fraction between 0 and 1, and correlation immune function is the extreme case when the fractional correla...

Journal: :Clinical science 2003
Duncan S Cole B Paul Morgan

Complement is a central component of the innate immune system involved in protection against pathogens. For many years, complement has been known to cause death of targets, either indirectly by attracting and activating phagocytes or directly by formation of a membrane pore, the membrane attack complex. More recently, it has been recognized that complement may cause other 'non-classical' effect...

Journal: :IACR Cryptology ePrint Archive 2015
Yandong Zheng Hua Guo

In 2014, Chen et al. proposed a one-way hash self-healing group key distribution scheme for resource-constrained wireless networks in Journal of Sensors (14(14):24358-24380, DOI: 10.3390/ s141224358). They asserted that their scheme 2 has the constant storage overhead, low communication overhead, and is secure, i.e., achieves mt-revocation capability, mt-wise forward secrecy, any-wise backward ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید