Bad Directions in Cryptographic Hash Functions (Q3194624): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Q3615926 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bad Directions in Cryptographic Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Biclique Cryptanalysis of the Full AES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: VSH, an Efficient and Provable Collision-Resistant Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Multilinear Maps over the Integers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: On best-possible obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Kangaroos, monopoly and discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5628224 / rank
 
Normal rank

Latest revision as of 23:11, 10 July 2024

scientific article
Language Label Description Also known as
English
Bad Directions in Cryptographic Hash Functions
scientific article

    Statements

    Bad Directions in Cryptographic Hash Functions (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    20 October 2015
    0 references
    symmetric cryptography
    0 references
    hash functions
    0 references
    password hashing
    0 references
    point obfuscation
    0 references
    matrix multiplication
    0 references
    meet-in-the-middle attacks
    0 references
    meet-in-many-middles attacks
    0 references

    Identifiers