Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








7,259 Hits in 2.9 sec

How to Launch a Powerful Side-Channel Collision Attack? [article]

Jiangshan Long, Changhai Ou, Yajun Ma, Yifan Fan, Hua Chen, Shihui Zheng
2022 IACR Cryptology ePrint Archive  
This optimizes the inefficient utilization of collision information in the existing collision attacks.  ...  To solve this, we theoretically analyze the quantitative relationship between encryptions and collisions in this paper, and propose an efficient side-channel attack named Collision-Paired Correlation Attack  ...  side-channel collision attack, CECA, stochastic collision attack and the optimal collision attack in [14] .  ... 
dblp:journals/iacr/LongOMFCZ22 fatcat:3nah4hvm5nawdlufpcxvtlesfe

On No-Sensing Adversarial Multi-player Multi-armed Bandits with Collision Communications [article]

Chengshuai Shi, Cong Shen
2021 arXiv   pre-print
All adversaries can be categorized based on the attackability and we introduce Adversary-Adaptive Collision-Communication (A2C2), a family of algorithms with forced-collision communication among players  ...  without collision information in an adversarial environment.  ...  Overall Review Collision-sensing stochastic and adversarial MP-MAB.  ... 
arXiv:2011.01090v2 fatcat:s3anqbrcubhuvjm2lk7mxs44ay

A New Class of Collision Attacks and Its Application to DES [chapter]

Kai Schramm, Thomas Wollinger, Christof Paar
2003 Lecture Notes in Computer Science  
Previous collision attacks were only able to detect collisions at the output of a particular function.  ...  In this publication we introduce a new class of attacks which originates from Hans Dobbertin and is based on the fact that side channel analysis can be used to detect internal collisions.  ...  Surprisingly, analysis of the collision sets Z ∆ revealed that stochastical dependencies among collision tests do exist for certain differentials.  ... 
doi:10.1007/978-3-540-39887-5_16 fatcat:kzi7zaixtzdlfbp4dep3vm4mqy

Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection [chapter]

Andrey Bogdanov, Ilya Kizhvatov, Andrey Pyshkin
2008 Lecture Notes in Computer Science  
To our best knowledge, this is the first real-world study of collision attacks based on generalized internal collisions.  ...  On this basis, a statistical framework for finding the instances of side-channel traces leaking most key information in collision attacks is proposed.  ...  Collision attacks.  ... 
doi:10.1007/978-3-540-89754-5_20 fatcat:xfe2klfkfjg4jda4ecd6hgwzwq

A Multi-Population Mean-Field Game Approach for Large-Scale Agents Cooperative Attack-Defense Evolution in High-Dimensional Environments

Guofang Wang, Ziming Li, Wang Yao, Sikai Xia
2022 Mathematics  
We jointly considered energy consumption, inter-group attack and defense, intra-group collision avoidance, and obstacle avoidance in their cost functions.  ...  Then, we formulated the cooperative attack–defense evolution of large-scale agents in high-dimensional environments as a multi-population high-dimensional stochastic mean-field game (MPHD-MFG), which significantly  ...  Therefore, we propose the multi-population high-dimensional stochastic MFG (MPHD-MFG) reformulation of the cooperative attack-defense problem (16) .  ... 
doi:10.3390/math10214075 fatcat:idffu63bnbdk5eaj62xawvrtly

A Note on Key Ranking for Optimal Collision Side-Channel Attacks [article]

Cezary Glowacz
2022 IACR Cryptology ePrint Archive  
In [1] we studied collision side-channel attacks, derived an optimal distinguisher for the key, and provided an optimal algorithm for maximizing the success rate of the attacks.  ...  In this note we show that the problem of key ranking using an optimal distinguisher for collision side-channel attacks is NP-hard.  ...  The NP-Hardness of Key Ranking for Collision Side-Channel Attacks The optimal distinguisher D opt.f un.gauss and its objective function D(k, x) which were derived in [1] for collision side-channel attacks  ... 
dblp:journals/iacr/Glowacz22 fatcat:iwuhw5lvdfh4lnmtgage6pumay

Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting [chapter]

Benoît Gérard, François-Xavier Standaert
2012 Lecture Notes in Computer Science  
Finally, we show that there exist (theoretical) contexts in which collision attacks succeed in exploiting leakages whereas all other non-profiled side-channel attacks fail.  ...  Side-channel collision attacks are one of the most investigated techniques allowing the combination of mathematical and physical cryptanalysis.  ...  stochastic attacks).  ... 
doi:10.1007/978-3-642-33027-8_11 fatcat:4r6txce5ynfglk7jtu64ofralq

On an Approach to Compute (at least Almost) Exact Probabilities for Differentia Hash Collision Paths

Max Gebhardt, Georg Illies, Werner Schindler
2008 Sicherheit  
The path probability determines the expected workload to generate a collision (and thus the true risk potential of a particular attack).  ...  This paper presents a new, generally applicable method to compute the probability of given differential (near-)collision paths in Merkle-Damgard-type hash functions.  ...  attack.  ... 
dblp:conf/sicherheit/GebhardtIS08 fatcat:whdwhfkkcjh4nezaa3epoujw2m

Page 113 of Journal of Thermophysics and Heat Transfer Vol. 3, Issue 2 [page]

1989 Journal of Thermophysics and Heat Transfer  
In many cases, these collisions can be described as a stochastic phenomenon.  ...  Thus, an attack- ing particle’s impact velocity is decreased, and its direction is changed, thereby possibly preventing its collision with the surface.  ... 

Snowball: Another View on Side-Channel Key Recovery Tools [article]

Jiangshan Long, Changhai Ou, Zhu Wang, Shihui Zheng, Fei Yan, Fan Zhang, Siew-Kei Lam
2022 IACR Cryptology ePrint Archive  
Limited to independent collision information utilization, collision attacks establish the relationship among sub-keys but do not significantly slow down this trend.  ...  We further introduce confusion coefficient into the collision attack to construct collision confusion coefficient, and deduce its relationship with correlation coefficient.  ...  Bruneau et al. combined the flavours of stochastic and collision attacks and provided the stochastic collision attack in [5] , which exploited scalar product scores to measure the similarity of leakages  ... 
dblp:journals/iacr/LongOWZYZL22 fatcat:cnbc4ekiujgxtdyr7hsr43ncoy

Robust Trajectory Prediction against Adversarial Attacks [article]

Yulong Cao, Danfei Xu, Xinshuo Weng, Zhuoqing Mao, Anima Anandkumar, Chaowei Xiao, Marco Pavone
2022 arXiv   pre-print
However, these methods are vulnerable to adversarial attacks, leading to serious consequences such as collisions.  ...  We demonstrate that our model can significantly reduce the severe accident rates (e.g., collisions and off-road driving).  ...  We select a MPC-based planner and evaluate the collision rates under the attack.  ... 
arXiv:2208.00094v1 fatcat:cfn53zad65d7zfhk5f2zs24h6y

Nash Equilibrium Control Policy against Bus-off Attacks in CAN Networks [article]

Jiacheng Tang, Shiping Shao, Jiguo Song, Abhishek Gupta
2021 arXiv   pre-print
This paper develops a stochastic transmission policy as a countermeasure for the controller-transmitter pair against the bus-off attack.  ...  We derive Nash equilibria of the game for two different information structures of the attacker. We show that the attacker has a dominant attack strategy under both information structures.  ...  collisions and an eventual bus-off event.  ... 
arXiv:2111.04950v1 fatcat:eb6gvxgnuff5zohy7q3ck36fb4

Sm-Arp: Stochastic Markovian Game Model for Packet Forwarding Based Arp Spoofing Attacks Detection

2019 International Journal of Engineering and Advanced Technology  
The objective of this paper is to develop SM-ARP, Stochastic Markovian game model based ARP spoofing attack detection scheme.Although many recent techniques have been developed to detect and protect against  ...  Address Resolution Protocol (ARP) spoofing attacks have become the most pivotal attacks in deteriorating the performance of computer networks.  ...  The delay cost or waiting cost occurring due to attacker collision is and relaying delay cost is .  ... 
doi:10.35940/ijeat.b3801.129219 fatcat:zpqmn47rajhaxbrvbayzp3uj5u

Learning When to Use Adaptive Adversarial Image Perturbations against Autonomous Vehicles [article]

Hyung-Jin Yoon, Hamidreza Jafarnejadsani, Petros Voulgaris
2023 arXiv   pre-print
We propose a multi-level stochastic optimization framework that monitors an attacker's capability of generating the adversarial perturbations.  ...  Based on this capability level, a binary decision attack/not attack is introduced to enhance the effectiveness of the attacker.  ...  method, the recursive attack methods demonstrated higher terminal rewards, collision rates, and terminal distances.  ... 
arXiv:2212.13667v2 fatcat:q6zeeonxgbbrfi5qdarggctqoa

CONTENTS [chapter]

2015 Introduction to Game Development  
Pathfinding In This Chapter ASearch Collision Detection Stochastic Navigation One-Dimensional Collisions Summary Two-Dimensional Collisions Exercises Broad Phase Collision Detection Resources Operational  ...  Characters Texturing Start Objectives Environments Theory Air Chapter 4 Hockey Pong: A 2D Game Mechanics Props (Tools, Equipment) Object Models Damaged In This Chapter General Movement Cut scenes PShape Attacking  ... 
doi:10.1515/9781942270645-toc fatcat:dezeybx5hjh45jighnpi7r3tje
« Previous Showing results 1 — 15 out of 7,259 results