The following pages link to Cryptanalysis of MD4 (Q1281786):
Displayed 16 items.
- A structure-based chaotic hashing scheme (Q327795) (← links)
- A combinatorial analysis of recent attacks on step reduced SHA-2 family (Q1032494) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- Cryptanalysis of SHA-0 and reduced SHA-1 (Q2018819) (← links)
- The rebound attack and subspace distinguishers: application to Whirlpool (Q2344049) (← links)
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (Q2637303) (← links)
- The NIST SHA-3 Competition: A Perspective on the Final Year (Q3011930) (← links)
- Multicollision attacks and generalized iterated hash functions (Q3068175) (← links)
- Optimal Covering Codes for Finding Near-Collisions (Q3084254) (← links)
- Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis (Q3452233) (← links)
- Fast Hashing on the Pentium (Q3452359) (← links)
- Extracts from the SHA-3 Competition (Q3455489) (← links)
- MD4 is Not One-Way (Q3525692) (← links)
- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 (Q3634493) (← links)
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others (Q3634495) (← links)
- Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques (Q3644204) (← links)