Pages that link to "Item:Q5451016"
From MaRDI portal
The following pages link to Finding Collisions in the Full SHA-1 (Q5451016):
Displaying 50 items.
- A fingerprint encryption scheme based on irreversible function and secure authentication (Q308819) (← links)
- New second-preimage attacks on hash functions (Q321303) (← links)
- Cryptanalysis of full \texttt{RIPEMD-128} (Q321321) (← links)
- A structure-based chaotic hashing scheme (Q327795) (← links)
- Chaotic hash function based on the dynamic S-box with variable parameters (Q333180) (← links)
- A provably secure non-iterative hash function resisting birthday attack (Q344781) (← links)
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions (Q396606) (← links)
- Cryptanalysis of GOST R hash function (Q402352) (← links)
- Concurrent signature without random oracles (Q476860) (← links)
- Improved cryptanalysis of AES-like permutations (Q484330) (← links)
- A characterization of chameleon hash functions and new, efficient designs (Q484332) (← links)
- An efficient ring signature scheme from pairings (Q528720) (← links)
- Memoryless near-collisions via coding theory (Q663464) (← links)
- Robust multi-property combiners for hash functions (Q744343) (← links)
- Rotational rebound attacks on reduced Skein (Q744348) (← links)
- Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes (Q831645) (← links)
- Open problems in hash function security (Q887443) (← links)
- Attacks on a double length blockcipher-based hash proposal (Q892386) (← links)
- New proofs for NMAC and HMAC: security without collision resistance (Q901373) (← links)
- Collision attack on \({\mathtt Grindahl}\) (Q901374) (← links)
- A synthetic indifferentiability analysis of some block-cipher-based hash functions (Q1009050) (← links)
- On the impossibility of highly-efficient blockcipher-based hash functions (Q1027986) (← links)
- On the ring-LWE and polynomial-LWE problems (Q1648786) (← links)
- Another step towards realizing random oracles: non-malleable point obfuscation (Q1648795) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- Quantum algorithm to find invariant linear structure of \(MD\) hash functions (Q2018202) (← links)
- Cryptanalysis of SHA-0 and reduced SHA-1 (Q2018819) (← links)
- New records of pre-image search of reduced SHA-1 using SAT solvers (Q2079908) (← links)
- Constructing chaos-based hash function via parallel impulse perturbation (Q2100269) (← links)
- Automatic verification of differential characteristics: application to reduced Gimli (Q2102064) (← links)
- Preimage attacks on 4-round Keccak by solving multivariate quadratic systems (Q2104437) (← links)
- Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions (Q2107924) (← links)
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound (Q2119014) (← links)
- The design of keyed hash function based on CNN-MD structure (Q2169761) (← links)
- Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 (Q2182064) (← links)
- Generic attacks on hash combiners (Q2188959) (← links)
- Constructing keyed hash algorithm using enhanced chaotic map with varying parameter (Q2193343) (← links)
- The phantom of differential characteristics (Q2205883) (← links)
- The rebound attack and subspace distinguishers: application to Whirlpool (Q2344049) (← links)
- Survey of information security (Q2385398) (← links)
- Chaotic hash function based on circular shifts with variable parameters (Q2410456) (← links)
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes (Q2416936) (← links)
- A secure and efficient on-line/off-line group key distribution protocol (Q2420472) (← links)
- Classification and generation of disturbance vectors for collision attacks against SHA-1 (Q2430693) (← links)
- Internal differential collision attacks on the reduced-round Grøstl-0 hash function (Q2439730) (← links)
- Second order collision for the 42-step reduced DHA-256 hash function (Q2445246) (← links)
- Integral distinguishers for reduced-round Stribog (Q2448116) (← links)
- A provably secure short signature scheme based on discrete logarithms (Q2456500) (← links)
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (Q2637303) (← links)
- Multiobjective evolutionary optimization techniques based hyperchaotic map and their applications in image encryption (Q2658572) (← links)