A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
How to Launch a Powerful Side-Channel Collision Attack?
[article]
2022
IACR Cryptology ePrint Archive
This optimizes the inefficient utilization of collision information in the existing collision attacks. ...
To solve this, we theoretically analyze the quantitative relationship between encryptions and collisions in this paper, and propose an efficient side-channel attack named Collision-Paired Correlation Attack ...
side-channel collision attack, CECA, stochastic collision attack and the optimal collision attack in [14] . ...
dblp:journals/iacr/LongOMFCZ22
fatcat:3nah4hvm5nawdlufpcxvtlesfe
On No-Sensing Adversarial Multi-player Multi-armed Bandits with Collision Communications
[article]
2021
arXiv
pre-print
All adversaries can be categorized based on the attackability and we introduce Adversary-Adaptive Collision-Communication (A2C2), a family of algorithms with forced-collision communication among players ...
without collision information in an adversarial environment. ...
Overall Review Collision-sensing stochastic and adversarial MP-MAB. ...
arXiv:2011.01090v2
fatcat:s3anqbrcubhuvjm2lk7mxs44ay
A New Class of Collision Attacks and Its Application to DES
[chapter]
2003
Lecture Notes in Computer Science
Previous collision attacks were only able to detect collisions at the output of a particular function. ...
In this publication we introduce a new class of attacks which originates from Hans Dobbertin and is based on the fact that side channel analysis can be used to detect internal collisions. ...
Surprisingly, analysis of the collision sets Z ∆ revealed that stochastical dependencies among collision tests do exist for certain differentials. ...
doi:10.1007/978-3-540-39887-5_16
fatcat:kzi7zaixtzdlfbp4dep3vm4mqy
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
[chapter]
2008
Lecture Notes in Computer Science
To our best knowledge, this is the first real-world study of collision attacks based on generalized internal collisions. ...
On this basis, a statistical framework for finding the instances of side-channel traces leaking most key information in collision attacks is proposed. ...
Collision attacks. ...
doi:10.1007/978-3-540-89754-5_20
fatcat:xfe2klfkfjg4jda4ecd6hgwzwq
A Multi-Population Mean-Field Game Approach for Large-Scale Agents Cooperative Attack-Defense Evolution in High-Dimensional Environments
2022
Mathematics
We jointly considered energy consumption, inter-group attack and defense, intra-group collision avoidance, and obstacle avoidance in their cost functions. ...
Then, we formulated the cooperative attack–defense evolution of large-scale agents in high-dimensional environments as a multi-population high-dimensional stochastic mean-field game (MPHD-MFG), which significantly ...
Therefore, we propose the multi-population high-dimensional stochastic MFG (MPHD-MFG) reformulation of the cooperative attack-defense problem (16) . ...
doi:10.3390/math10214075
fatcat:idffu63bnbdk5eaj62xawvrtly
A Note on Key Ranking for Optimal Collision Side-Channel Attacks
[article]
2022
IACR Cryptology ePrint Archive
In [1] we studied collision side-channel attacks, derived an optimal distinguisher for the key, and provided an optimal algorithm for maximizing the success rate of the attacks. ...
In this note we show that the problem of key ranking using an optimal distinguisher for collision side-channel attacks is NP-hard. ...
The NP-Hardness of Key Ranking for Collision Side-Channel Attacks The optimal distinguisher D opt.f un.gauss and its objective function D(k, x) which were derived in [1] for collision side-channel attacks ...
dblp:journals/iacr/Glowacz22
fatcat:iwuhw5lvdfh4lnmtgage6pumay
Unified and Optimized Linear Collision Attacks and Their Application in a Non-profiled Setting
[chapter]
2012
Lecture Notes in Computer Science
Finally, we show that there exist (theoretical) contexts in which collision attacks succeed in exploiting leakages whereas all other non-profiled side-channel attacks fail. ...
Side-channel collision attacks are one of the most investigated techniques allowing the combination of mathematical and physical cryptanalysis. ...
stochastic attacks). ...
doi:10.1007/978-3-642-33027-8_11
fatcat:4r6txce5ynfglk7jtu64ofralq
On an Approach to Compute (at least Almost) Exact Probabilities for Differentia Hash Collision Paths
2008
Sicherheit
The path probability determines the expected workload to generate a collision (and thus the true risk potential of a particular attack). ...
This paper presents a new, generally applicable method to compute the probability of given differential (near-)collision paths in Merkle-Damgard-type hash functions. ...
attack. ...
dblp:conf/sicherheit/GebhardtIS08
fatcat:whdwhfkkcjh4nezaa3epoujw2m
Page 113 of Journal of Thermophysics and Heat Transfer Vol. 3, Issue 2
[page]
1989
Journal of Thermophysics and Heat Transfer
In many cases, these collisions can be described as a stochastic phenomenon. ...
Thus, an attack- ing particle’s impact velocity is decreased, and its direction is changed, thereby possibly preventing its collision with the surface. ...
Snowball: Another View on Side-Channel Key Recovery Tools
[article]
2022
IACR Cryptology ePrint Archive
Limited to independent collision information utilization, collision attacks establish the relationship among sub-keys but do not significantly slow down this trend. ...
We further introduce confusion coefficient into the collision attack to construct collision confusion coefficient, and deduce its relationship with correlation coefficient. ...
Bruneau et al. combined the flavours of stochastic and collision attacks and provided the stochastic collision attack in [5] , which exploited scalar product scores to measure the similarity of leakages ...
dblp:journals/iacr/LongOWZYZL22
fatcat:cnbc4ekiujgxtdyr7hsr43ncoy
Robust Trajectory Prediction against Adversarial Attacks
[article]
2022
arXiv
pre-print
However, these methods are vulnerable to adversarial attacks, leading to serious consequences such as collisions. ...
We demonstrate that our model can significantly reduce the severe accident rates (e.g., collisions and off-road driving). ...
We select a MPC-based planner and evaluate the collision rates under the attack. ...
arXiv:2208.00094v1
fatcat:cfn53zad65d7zfhk5f2zs24h6y
Nash Equilibrium Control Policy against Bus-off Attacks in CAN Networks
[article]
2021
arXiv
pre-print
This paper develops a stochastic transmission policy as a countermeasure for the controller-transmitter pair against the bus-off attack. ...
We derive Nash equilibria of the game for two different information structures of the attacker. We show that the attacker has a dominant attack strategy under both information structures. ...
collisions and an eventual bus-off event. ...
arXiv:2111.04950v1
fatcat:eb6gvxgnuff5zohy7q3ck36fb4
Sm-Arp: Stochastic Markovian Game Model for Packet Forwarding Based Arp Spoofing Attacks Detection
2019
International Journal of Engineering and Advanced Technology
The objective of this paper is to develop SM-ARP, Stochastic Markovian game model based ARP spoofing attack detection scheme.Although many recent techniques have been developed to detect and protect against ...
Address Resolution Protocol (ARP) spoofing attacks have become the most pivotal attacks in deteriorating the performance of computer networks. ...
The delay cost or waiting cost occurring due to attacker collision is and relaying delay cost is . ...
doi:10.35940/ijeat.b3801.129219
fatcat:zpqmn47rajhaxbrvbayzp3uj5u
Learning When to Use Adaptive Adversarial Image Perturbations against Autonomous Vehicles
[article]
2023
arXiv
pre-print
We propose a multi-level stochastic optimization framework that monitors an attacker's capability of generating the adversarial perturbations. ...
Based on this capability level, a binary decision attack/not attack is introduced to enhance the effectiveness of the attacker. ...
method, the recursive attack methods demonstrated higher terminal rewards, collision rates, and terminal distances. ...
arXiv:2212.13667v2
fatcat:q6zeeonxgbbrfi5qdarggctqoa
CONTENTS
[chapter]
2015
Introduction to Game Development
Pathfinding In This Chapter ASearch Collision Detection Stochastic Navigation One-Dimensional Collisions Summary Two-Dimensional Collisions Exercises Broad Phase Collision Detection Resources Operational ...
Characters Texturing Start Objectives Environments Theory Air Chapter 4 Hockey Pong: A 2D Game Mechanics Props (Tools, Equipment) Object Models Damaged In This Chapter General Movement Cut scenes PShape Attacking ...
doi:10.1515/9781942270645-toc
fatcat:dezeybx5hjh45jighnpi7r3tje
« Previous
Showing results 1 — 15 out of 7,259 results