Pages that link to "Item:Q5451016"
From MaRDI portal
The following pages link to Finding Collisions in the Full SHA-1 (Q5451016):
Displayed 50 items.
- Experimental Verification of Super-Sbox Analysis — Confirmation of Detailed Attack Complexity (Q3098004) (← links)
- Improving Smart Card Security Using Elliptic Curve Cryptography over Prime Field (F p ) (Q3100520) (← links)
- Practical Analysis of Reduced-Round Keccak (Q3104737) (← links)
- Boomerang Distinguisher for the SIMD-512 Compression Function (Q3104738) (← links)
- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n (Q3399201) (← links)
- On Free-Start Collisions and Collisions for TIB3 (Q3399203) (← links)
- Cryptanalysis of the Round-Reduced GOST Hash Function (Q3454162) (← links)
- Boomerang Attack on Step-Reduced SHA-512 (Q3454592) (← links)
- Practical Free-Start Collision Attacks on 76-step SHA-1 (Q3457131) (← links)
- Cryptanalysis of Grindahl (Q3498399) (← links)
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function (Q3503871) (← links)
- Does Secure Time-Stamping Imply Collision-Free Hash Functions? (Q3503876) (← links)
- Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function (Q3506389) (← links)
- Attacking Reduced Round SHA-256 (Q3506406) (← links)
- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography (Q3506407) (← links)
- New Differential-Algebraic Attacks and Reparametrization of Rainbow (Q3506411) (← links)
- Non-linear Reduced Round Attacks against SHA-2 Hash Family (Q3511168) (← links)
- Collisions for Round-Reduced LAKE (Q3511169) (← links)
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL (Q3525673) (← links)
- A (Second) Preimage Attack on the GOST Hash Function (Q3525675) (← links)
- MD4 is Not One-Way (Q3525692) (← links)
- Digital Signatures Out of Second-Preimage Resistant Hash Functions (Q3535355) (← links)
- Collisions for RC4-Hash (Q3540156) (← links)
- Herding Hash Functions and the Nostradamus Attack (Q3593096) (← links)
- Cryptanalysis of the GOST Hash Function (Q3600219) (← links)
- Compression from Collisions, or Why CRHF Combiners Have a Long Output (Q3600232) (← links)
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures (Q3600329) (← links)
- Hash Functions from Sigma Protocols and Improvements to VSH (Q3600369) (← links)
- How to Fill Up Merkle-Damgård Hash Functions (Q3600380) (← links)
- Public Key Authentication with Memory Tokens (Q3605389) (← links)
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations (Q3623032) (← links)
- Speeding up Collision Search for Byte-Oriented Hash Functions (Q3623043) (← links)
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures (Q3627429) (← links)
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC (Q3627431) (← links)
- Hash function requirements for Schnorr signatures (Q3632752) (← links)
- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 (Q3634493) (← links)
- On the Weak Ideal Compression Functions (Q3634496) (← links)
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL (Q3637128) (← links)
- A Three-Property-Secure Hash Function (Q3644203) (← links)
- Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques (Q3644204) (← links)
- Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck (Q4639485) (← links)
- Collision Resistant Double-Length Hashing (Q4933214) (← links)
- Interpreting Hash Function Security Proofs (Q4933215) (← links)
- Classification of disturbance vectors for collision attack in SHA-1 (Q5046483) (← links)
- A Novel Elliptic Curve Cryptography Based Approach of Re-watermarking for Cheque Truncation System (Q5069669) (← links)
- Comment on "Cryptanalysis and improvement of the secure quantum sealed-bid auction with post confirmation" (Q5175598) (← links)
- A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map (Q5357150) (← links)
- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL (Q5385522) (← links)
- Colliding Message Pair for 53-Step HAS-160 (Q5385530) (← links)
- Weaknesses in the HAS-V Compression Function (Q5385531) (← links)