Pages that link to "Item:Q5385721"
From MaRDI portal
The following pages link to Collisions of SHA-0 and Reduced SHA-1 (Q5385721):
Displayed 19 items.
- New second-preimage attacks on hash functions (Q321303) (← links)
- A structure-based chaotic hashing scheme (Q327795) (← links)
- A provably secure non-iterative hash function resisting birthday attack (Q344781) (← links)
- Rotational rebound attacks on reduced Skein (Q744348) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- Cryptanalysis of SHA-0 and reduced SHA-1 (Q2018819) (← links)
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance (Q2061937) (← links)
- Classification and generation of disturbance vectors for collision attacks against SHA-1 (Q2430693) (← links)
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (Q2637303) (← links)
- MJH: A Faster Alternative to MDC-2 (Q3073709) (← links)
- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography (Q3506407) (← links)
- Herding Hash Functions and the Nostradamus Attack (Q3593096) (← links)
- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC (Q3627431) (← links)
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL (Q3637128) (← links)
- Classification of disturbance vectors for collision attack in SHA-1 (Q5046483) (← links)
- Collisions of SHA-0 and Reduced SHA-1 (Q5385721) (← links)
- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search (Q5452246) (← links)
- Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256 (Q5504547) (← links)
- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions (Q5505473) (← links)