搜索结果: 1-5 共查到“Practical Attack”相关记录5条 . 查询时间(0.093 秒)
A Tale of Three Signatures: practical attack of ECDSA with wNAF
ECDSA lattice techniques cryptanalysis
2019/7/25
Attacking ECDSA with wNAF implementation for the scalar multiplication first requires some side channel analysis to collect information, then lattice based methods to recover the secret key. In this p...
RaCoSS is a signature scheme based on the syndrome decoding problem over the random linear code and proposed by Fukushima, Roy, Xu, Kiyomoto, Morozov, and Takagi. This scheme is cryptanalyzed Bernstei...
Nonlinear Invariant Attack --Practical Attack on Full SCREAM, iSCREAM, and Midori64
Nonlinear invariant attack Boolean function Ciphertext-only attack
2016/7/29
In this paper we introduce a new type of attack, called nonlinear invariant attack.
As application examples, we present new attacks that are able to distinguish the full versions
of the (tweakable) ...
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System
implementation RC4 cryptanalysis
2016/1/6
The HIVE hidden volume encryption system was proposed by Blass et al.
at ACM-CCS 2014. Even though HIVE has a security proof, this paper demonstrates
an attack on its implementation that breaks the ...
A Practical Attack on the Root Problem in Braid Groups
Practical Attack Root Problem Braid Groups
2009/3/19
Using a simple heuristic approach to the root problem in braid
groups, we show that cryptographic parameters proposed in this context must
be considered as insecure. In our experiments we can, often...