Searched full:attacks (Results 1 – 18 of 18) sorted by relevance
41 * Security: SHA-256 provides 128 bits of security against collision attacks42 * and 256 bits of security against pre-image attacks. SHA-256 does
48 * collision attacks. Note however that an external attacker cannot83 * attacks that swap bytes, so the order in which data is mixed
71 * side-channel attacks for uECC_shared_secret().
46 * are much less affected by collision attacks than their
54 * security against collision attacks (that aim at finding different
219 * side-channel attacks for uECC_shared_secret().
114 variety of side-channel attacks, many of them only relevant to certain 133 might be vulnerable to timing attacks; thus be sure to use a constant-time184 attacks. Note however that an external attacker cannot generate the tags212 against collision attacks (that aim at finding different messages that
69 * certain timing attacks. Without these dummy calls, in tc_hmac_set_key()
175 * improve protection against side-channel attacks. */ in uECC_shared_secret()
111 * make the user vulnerable to attacks which negotiate the least secure
483 * make the user vulnerable to attacks which negotiate the least secure in pppSetAuth()
509 replay attacks).
442 * make the user vulnerable to attacks which negotiate the least secure
446 * make the user vulnerable to attacks which negotiate the least secure
806 * Without CA certificate, connection will be prone to man-in-the-middle attacks */ in altcp_tls_create_config_client_common()
100 * simplifies replay attacks.
2429 * allow for TCP spoofing attacks. This hook provides the means to implement
2748 * allow for TCP spoofing attacks. This hook provides the means to implement