Pages that link to "Item:Q5451016"
From MaRDI portal
The following pages link to Finding Collisions in the Full SHA-1 (Q5451016):
Displayed 50 items.
- A fingerprint encryption scheme based on irreversible function and secure authentication (Q308819) (← links)
- New second-preimage attacks on hash functions (Q321303) (← links)
- Cryptanalysis of full \texttt{RIPEMD-128} (Q321321) (← links)
- A structure-based chaotic hashing scheme (Q327795) (← links)
- Chaotic hash function based on the dynamic S-box with variable parameters (Q333180) (← links)
- A provably secure non-iterative hash function resisting birthday attack (Q344781) (← links)
- A SAT-based preimage analysis of reduced \textsc{Keccak} hash functions (Q396606) (← links)
- Cryptanalysis of GOST R hash function (Q402352) (← links)
- Concurrent signature without random oracles (Q476860) (← links)
- Improved cryptanalysis of AES-like permutations (Q484330) (← links)
- A characterization of chameleon hash functions and new, efficient designs (Q484332) (← links)
- An efficient ring signature scheme from pairings (Q528720) (← links)
- Memoryless near-collisions via coding theory (Q663464) (← links)
- Robust multi-property combiners for hash functions (Q744343) (← links)
- Rotational rebound attacks on reduced Skein (Q744348) (← links)
- Open problems in hash function security (Q887443) (← links)
- Attacks on a double length blockcipher-based hash proposal (Q892386) (← links)
- New proofs for NMAC and HMAC: security without collision resistance (Q901373) (← links)
- Collision attack on \({\mathtt Grindahl}\) (Q901374) (← links)
- A synthetic indifferentiability analysis of some block-cipher-based hash functions (Q1009050) (← links)
- On the impossibility of highly-efficient blockcipher-based hash functions (Q1027986) (← links)
- On the ring-LWE and polynomial-LWE problems (Q1648786) (← links)
- Another step towards realizing random oracles: non-malleable point obfuscation (Q1648795) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- Quantum algorithm to find invariant linear structure of \(MD\) hash functions (Q2018202) (← links)
- Cryptanalysis of SHA-0 and reduced SHA-1 (Q2018819) (← links)
- The rebound attack and subspace distinguishers: application to Whirlpool (Q2344049) (← links)
- Survey of information security (Q2385398) (← links)
- Chaotic hash function based on circular shifts with variable parameters (Q2410456) (← links)
- MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes (Q2416936) (← links)
- A secure and efficient on-line/off-line group key distribution protocol (Q2420472) (← links)
- Classification and generation of disturbance vectors for collision attacks against SHA-1 (Q2430693) (← links)
- Internal differential collision attacks on the reduced-round Grøstl-0 hash function (Q2439730) (← links)
- Second order collision for the 42-step reduced DHA-256 hash function (Q2445246) (← links)
- Integral distinguishers for reduced-round Stribog (Q2448116) (← links)
- A provably secure short signature scheme based on discrete logarithms (Q2456500) (← links)
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (Q2637303) (← links)
- Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA (Q2794507) (← links)
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound (Q2817474) (← links)
- Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL (Q2889860) (← links)
- Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256 (Q2946882) (← links)
- Analysis of Message Injection in Stream Cipher-Based Hash Functions (Q3011315) (← links)
- Collisions of MMO-MD5 and Their Impact on Original MD5 (Q3011908) (← links)
- Analysis of Reduced-SHAvite-3-256 v2 (Q3013078) (← links)
- Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function (Q3013080) (← links)
- A fast pseudorandom number generator with BLAKE hash function (Q3017399) (← links)
- MJH: A Faster Alternative to MDC-2 (Q3073709) (← links)
- Optimal Covering Codes for Finding Near-Collisions (Q3084254) (← links)
- Security Analysis of SIMD (Q3084266) (← links)
- A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators (Q3098001) (← links)