Pages that link to "Item:Q5451016"
From MaRDI portal
The following pages link to Finding Collisions in the Full SHA-1 (Q5451016):
Displayed 24 items.
- Collisions of SHA-0 and Reduced SHA-1 (Q5385721) (← links)
- How to Build a Hash Function from Any Collision-Resistant Function (Q5387097) (← links)
- Security of Digital Signature Schemes in Weakened Random Oracle Models (Q5445458) (← links)
- Multi-property Preserving Combiners for Hash Functions (Q5445516) (← links)
- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search (Q5452246) (← links)
- Cryptanalysis of the CRUSH Hash Function (Q5452247) (← links)
- The Delicate Issues of Addition with Respect to XOR Differences (Q5452258) (← links)
- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses (Q5458201) (← links)
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 (Q5458595) (← links)
- Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes (Q5458930) (← links)
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks (Q5458931) (← links)
- Security of NMAC and HMAC Based on Non-malleability (Q5458937) (← links)
- Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security (Q5492131) (← links)
- Hash Functions and RFID Tags: Mind the Gap (Q5502785) (← links)
- Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256 (Q5504547) (← links)
- Efficient Hash Collision Search Strategies on Special-Purpose Hardware (Q5504548) (← links)
- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions (Q5505473) (← links)
- A vulnerability in implementations of SHA-3, SHAKE, EdDSA, and other NIST-approved algorithms (Q6080893) (← links)
- Meet-in-the-middle preimage attacks on sponge-based hashing (Q6083128) (← links)
- Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP (Q6083129) (← links)
- Triangulating rebound attack on AES-like hashing (Q6097258) (← links)
- Allocating rotational cryptanalysis-based preimage attack on 4-round \textsc{Keccak}-224 for quantum setting (Q6098292) (← links)
- Practical-time related-key attack on GOST with secret S-boxes (Q6145945) (← links)
- Quantum and semi-quantum lottery: strategies and advantages (Q6171455) (← links)