Pages that link to "Item:Q5385718"
From MaRDI portal
The following pages link to How to Break MD5 and Other Hash Functions (Q5385718):
Displayed 50 items.
- New second-preimage attacks on hash functions (Q321303) (← links)
- Cryptanalysis of full \texttt{RIPEMD-128} (Q321321) (← links)
- A structure-based chaotic hashing scheme (Q327795) (← links)
- A new one-bit difference collision attack on HAVAL-128 (Q362172) (← links)
- Cryptanalysis of GOST R hash function (Q402352) (← links)
- Keyed hash function based on a chaotic map (Q425540) (← links)
- Concurrent signature without random oracles (Q476860) (← links)
- Improved cryptanalysis of AES-like permutations (Q484330) (← links)
- A characterization of chameleon hash functions and new, efficient designs (Q484332) (← links)
- A novel keyed parallel hashing scheme based on a new chaotic system (Q508257) (← links)
- Memoryless near-collisions via coding theory (Q663464) (← links)
- Analysis and improvement of a chaos-based hash function construction (Q718239) (← links)
- Parallel hash function construction based on coupled map lattices (Q718608) (← links)
- Robust multi-property combiners for hash functions (Q744343) (← links)
- Rotational rebound attacks on reduced Skein (Q744348) (← links)
- CHAP and rewrite components (Q766175) (← links)
- Open problems in hash function security (Q887443) (← links)
- Attacks on a double length blockcipher-based hash proposal (Q892386) (← links)
- New proofs for NMAC and HMAC: security without collision resistance (Q901373) (← links)
- Collision attack on \({\mathtt Grindahl}\) (Q901374) (← links)
- A synthetic indifferentiability analysis of some block-cipher-based hash functions (Q1009050) (← links)
- On the impossibility of highly-efficient blockcipher-based hash functions (Q1027986) (← links)
- Review of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigm (Q1643980) (← links)
- Another step towards realizing random oracles: non-malleable point obfuscation (Q1648795) (← links)
- sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives (Q1746961) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- Simple hash function using discrete-time quantum walks (Q1993832) (← links)
- Quantum algorithm to find invariant linear structure of \(MD\) hash functions (Q2018202) (← links)
- Cryptanalysis of SHA-0 and reduced SHA-1 (Q2018819) (← links)
- Upper-bound estimation of the average probabilities of integer-valued differentials in the composition of key adder, substitution block, and shift operator (Q2247814) (← links)
- Fast correlation attack on stream cipher ABC v3 (Q2250730) (← links)
- Hash function based on quantum walks (Q2322065) (← links)
- The rebound attack and subspace distinguishers: application to Whirlpool (Q2344049) (← links)
- High order differential attacks on stream ciphers (Q2376658) (← links)
- Survey of information security (Q2385398) (← links)
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes (Q2416936) (← links)
- A secure and efficient on-line/off-line group key distribution protocol (Q2420472) (← links)
- Practical collisions for EnRUPT (Q2429710) (← links)
- Internal differential collision attacks on the reduced-round Grøstl-0 hash function (Q2439730) (← links)
- Integral distinguishers for reduced-round Stribog (Q2448116) (← links)
- Upper-bound estimates for the average probabilities of integer differentials of round functions of certain block ciphers (Q2452738) (← links)
- One-way hash function construction based on 2D coupled map lattices (Q2476772) (← links)
- Novel strategies for searching RC4 key collisions (Q2629507) (← links)
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (Q2637303) (← links)
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA (Q2794507) (← links)
- Post-Quantum Cryptography: State of the Art (Q2803619) (← links)
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound (Q2817474) (← links)
- Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL (Q2889860) (← links)
- Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions (Q2945385) (← links)
- Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 (Q2946882) (← links)