Pages that link to "Item:Q5385717"
From MaRDI portal
The following pages link to Cryptanalysis of the Hash Functions MD4 and RIPEMD (Q5385717):
Displaying 50 items.
- New second-preimage attacks on hash functions (Q321303) (← links)
- Cryptanalysis of full \texttt{RIPEMD-128} (Q321321) (← links)
- Keyed hash function based on a chaotic map (Q425540) (← links)
- Parallel hash function construction based on coupled map lattices (Q718608) (← links)
- Collision attack on \({\mathtt Grindahl}\) (Q901374) (← links)
- On the impossibility of highly-efficient blockcipher-based hash functions (Q1027986) (← links)
- A combinatorial analysis of recent attacks on step reduced SHA-2 family (Q1032494) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- Simple hash function using discrete-time quantum walks (Q1993832) (← links)
- Cryptanalysis of SHA-0 and reduced SHA-1 (Q2018819) (← links)
- A quantum hash function with grouped coarse-grained boson sampling (Q2102295) (← links)
- Preimage attacks on 4-round Keccak by solving multivariate quadratic systems (Q2104437) (← links)
- Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 (Q2182064) (← links)
- Hash function based on quantum walks (Q2322065) (← links)
- Survey of information security (Q2385398) (← links)
- One-way hash function construction based on 2D coupled map lattices (Q2476772) (← links)
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (Q2637303) (← links)
- BREAKING A CHAOTIC IMAGE ENCRYPTION ALGORITHM BASED ON MODULO ADDITION AND XOR OPERATION (Q2845204) (← links)
- Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL (Q2889860) (← links)
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function (Q3013080) (← links)
- MJH: A Faster Alternative to MDC-2 (Q3073709) (← links)
- Security Analysis of SIMD (Q3084266) (← links)
- Cryptanalysis of Grindahl (Q3498399) (← links)
- Does Secure Time-Stamping Imply Collision-Free Hash Functions? (Q3503876) (← links)
- Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function (Q3506389) (← links)
- Attacking Reduced Round SHA-256 (Q3506406) (← links)
- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography (Q3506407) (← links)
- Collisions for Round-Reduced LAKE (Q3511169) (← links)
- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak (Q3519537) (← links)
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL (Q3525673) (← links)
- A (Second) Preimage Attack on the GOST Hash Function (Q3525675) (← links)
- MD4 is Not One-Way (Q3525692) (← links)
- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru (Q3525694) (← links)
- Herding Hash Functions and the Nostradamus Attack (Q3593096) (← links)
- Cryptanalysis of the GOST Hash Function (Q3600219) (← links)
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures (Q3600329) (← links)
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC (Q3627431) (← links)
- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 (Q3634493) (← links)
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others (Q3634495) (← links)
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL (Q3637128) (← links)
- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5 (Q3644196) (← links)
- Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques (Q3644204) (← links)
- Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck (Q4639485) (← links)
- Collision Resistant Double-Length Hashing (Q4933214) (← links)
- Design and Analysis on a Parallel Chaos-Based Hash Function (Q5138299) (← links)
- One-Way Hash Function Based on Delay-Induced Hyperchaos (Q5222619) (← links)
- A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map (Q5357150) (← links)
- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL (Q5385522) (← links)
- Weaknesses in the HAS-V Compression Function (Q5385531) (← links)
- Multi-property Preserving Combiners for Hash Functions (Q5445516) (← links)