A (Second) Preimage Attack on the GOST Hash Function (Q3525675): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_14 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1797949276 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Study of the MD5 Attacks: Insights and Improvements / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding SHA-1 Characteristics: General Results and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Second Preimages for SMASH / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2762766 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Hash Functions MD4 and RIPEMD / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Collisions in the Full SHA-1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Break MD5 and Other Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Full HAVAL with 4 and 5 Passes / rank
 
Normal rank

Latest revision as of 16:25, 28 June 2024

scientific article
Language Label Description Also known as
English
A (Second) Preimage Attack on the GOST Hash Function
scientific article

    Statements

    Identifiers