Pages that link to "Item:Q5451015"
From MaRDI portal
The following pages link to Efficient Collision Search Attacks on SHA-0 (Q5451015):
Displayed 40 items.
- New second-preimage attacks on hash functions (Q321303) (← links)
- Cryptanalysis of full \texttt{RIPEMD-128} (Q321321) (← links)
- Collision attack on \({\mathtt Grindahl}\) (Q901374) (← links)
- On the impossibility of highly-efficient blockcipher-based hash functions (Q1027986) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- Quantum algorithm to find invariant linear structure of \(MD\) hash functions (Q2018202) (← links)
- Cryptanalysis of SHA-0 and reduced SHA-1 (Q2018819) (← links)
- Preimage attacks on 4-round Keccak by solving multivariate quadratic systems (Q2104437) (← links)
- Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 (Q2182064) (← links)
- Differential entropy analysis of the IDEA block cipher (Q2349636) (← links)
- Survey of information security (Q2385398) (← links)
- Classification and generation of disturbance vectors for collision attacks against SHA-1 (Q2430693) (← links)
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (Q2637303) (← links)
- The NIST SHA-3 Competition: A Perspective on the Final Year (Q3011930) (← links)
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function (Q3013080) (← links)
- Cryptanalysis of the Round-Reduced GOST Hash Function (Q3454162) (← links)
- Cryptanalysis of Grindahl (Q3498399) (← links)
- Does Secure Time-Stamping Imply Collision-Free Hash Functions? (Q3503876) (← links)
- Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function (Q3506389) (← links)
- Non-linear Reduced Round Attacks against SHA-2 Hash Family (Q3511168) (← links)
- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak (Q3519537) (← links)
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL (Q3525673) (← links)
- Collisions for RC4-Hash (Q3540156) (← links)
- Herding Hash Functions and the Nostradamus Attack (Q3593096) (← links)
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures (Q3600329) (← links)
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC (Q3627431) (← links)
- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 (Q3634493) (← links)
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL (Q3637128) (← links)
- A Three-Property-Secure Hash Function (Q3644203) (← links)
- Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques (Q3644204) (← links)
- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL (Q5385522) (← links)
- Collisions of SHA-0 and Reduced SHA-1 (Q5385721) (← links)
- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search (Q5452246) (← links)
- The Delicate Issues of Addition with Respect to XOR Differences (Q5452258) (← links)
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 (Q5458595) (← links)
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks (Q5458931) (← links)
- Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security (Q5492131) (← links)
- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions (Q5505473) (← links)
- Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP (Q6083129) (← links)
- Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting (Q6098292) (← links)