咨询与建议

限定检索结果

文献类型

  • 6 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 5 篇 网络空间安全
    • 2 篇 计算机科学与技术...
  • 4 篇 军事学
    • 4 篇 军队指挥学
  • 1 篇 理学
    • 1 篇 数学

主题

  • 7 篇 collision attack
  • 2 篇 block cipher
  • 2 篇 power analysis a...
  • 2 篇 hash function
  • 2 篇 masking
  • 1 篇 extended expande...
  • 1 篇 authenticated en...
  • 1 篇 fault sensitivit...
  • 1 篇 key
  • 1 篇 least square met...
  • 1 篇 sha-1
  • 1 篇 time complexity.
  • 1 篇 data complexity
  • 1 篇 chosen-message a...
  • 1 篇 collision resist...
  • 1 篇 preimage attack
  • 1 篇 right or wrong c...
  • 1 篇 ripemd
  • 1 篇 extended md4
  • 1 篇 authenticated en...

机构

  • 1 篇 department of el...
  • 1 篇 the information ...
  • 1 篇 key laboratory o...
  • 1 篇 science and tech...
  • 1 篇 school of comput...
  • 1 篇 college of bioen...
  • 1 篇 school of comput...
  • 1 篇 international bu...
  • 1 篇 institute of mic...
  • 1 篇 state key labora...
  • 1 篇 statekeylaborato...
  • 1 篇 school of comput...
  • 1 篇 science and tech...
  • 1 篇 school of cybers...
  • 1 篇 china academy of...
  • 1 篇 state key labora...

作者

  • 1 篇 zheng xuexin
  • 1 篇 jinquan zhang
  • 1 篇 liehuang zhu
  • 1 篇 gao-li wang
  • 1 篇 wang xiaomei
  • 1 篇 wu liji
  • 1 篇 guoshuang zhang
  • 1 篇 wunan wan
  • 1 篇 han wenbao
  • 1 篇 jun chen
  • 1 篇 wang an
  • 1 篇 wang zongyue
  • 1 篇 hao chen
  • 1 篇 yu zhang
  • 1 篇 zeng guang
  • 1 篇 tang yuchen
  • 1 篇 an wang
  • 1 篇 chen man
  • 1 篇 zhang guoshuang
  • 1 篇 weina tian

语言

  • 7 篇 英文
检索条件"主题词=collision attack"
7 条 记 录,以下是1-10 订阅
排序:
collision attack on reduced-round Camellia
收藏 引用
Science in China(Series F) 2005年 第1期48卷 78-90页
作者: WUWenling FENGDengguo StateKeyLaboratoryofInformationSecurity InstituteofSoftwareChineseAcademyofSciencesBeijing100080China
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between 4-round Camellia and a random permutation of the blocks space. By using collision-searc... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
collision attack on the Full Extended MD4 and Pseudo-Preimage attack on RIPEMD
收藏 引用
Journal of Computer Science & Technology 2013年 第1期28卷 129-143页
作者: Gao-Li Wang School of Computer Science and Technology Donghua University Shanghai 201620 China State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 China
The cryptographic hash functions Extended MD4 and RIPEMD are double-branch hash functions, which consist of two parallel branches. Extended MD4 was proposed by Rivest in 1990, and RIPEMD was devised in the framework o... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Classification of disturbance vectors for collision attack in SHA-1
收藏 引用
Science China(Information Sciences) 2015年 第11期58卷 103-112页
作者: TANG YuChen ZENG Guang HAN WenBao The Information Engineering University
A good disturbance vector is one of the key techniques to find SHA-1 collisions and to construct valid differential paths. The main work of this paper is to classify the types of the optimal disturbance ***, we improv... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Clustering collision Power attack on RSA-CRT
收藏 引用
Computer Systems Science & Engineering 2021年 第2期36卷 417-434页
作者: Wunan Wan Jun Chen Jinyue Xia Jinquan Zhang Shibin Zhang Hao Chen School of Cybersecurity Chengdu University of Information TechnologyChengdu610225China International Business Machines Corporation(IBM) New York10041 NY 212USA
In this paper,we propose two new attack algorithms on RSA implementations with CRT(Chinese remainder theorem).To improve the attack efficiency considerably,a clustering collision power attack on RSA with CRT is introd... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Right or wrong collision rate analysis without profiling: full-automatic collision fault attack
收藏 引用
Science China(Information Sciences) 2018年 第3期61卷 5-15页
作者: An WANG Yu ZHANG Weina TIAN Qian WANG Guoshuang ZHANG Liehuang ZHU School of Computer Science Beijing Institute of Technology State Key Laboratory of Cryptology College of Bioengineering Beijing Polytechnic Department of Electrical and Computer Engineering University of Maryland Science and Technology on Information Assurance Laboratory
In CHES 2010, Fault Sensitivity Analysis(FSA) on Advanced Encryption Standard(AES) hardware circuit based on S-box setup-time acquired by injecting clock glitches is proposed. Soon after, some improvements of FSA were... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Efficient collision attacks on smart card implementations of masked AES
收藏 引用
Science China(Information Sciences) 2015年 第5期58卷 97-111页
作者: WANG An WANG ZongYue ZHENG XueXin WANG XiaoMei CHEN Man ZHANG GuoShuang WU LiJi Institute of Microelectronics Tsinghua University Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University China Academy of Electronics and Information Technology School of Computer and Communication Engineering University of Science and TechnologyBeijing Science and Technology on Communication Security Laboratory
collision attack is often employed against some cryptographic algorithms such as AES and *** a usual countermeasure, masking can resist such attacks to some extent. In CHES 2011, Clavier et *** a collision-correlation... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Efficient Scheme of Authenticated Encryption with Associated Data
An Efficient Scheme of Authenticated Encryption with Associa...
收藏 引用
2010 Chinese Control and Decision Conference
作者: Shaolan Zhang~(1,2) Guobo Xing~2 Yixian Yang~1 1.Information Security Center,State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications Beijing 100876 2.School of Computer Science & technology,Shandong Jianzhu University,Shandong Jinan 250101
<正>An efficient scheme of authenticated encryption with associated data is provided by combining a collision resistant hash function with an authenticated encryption *** hash function is used to compress an arbitra... 详细信息
来源: cnki会议 评论