Cryptology and Network Security
From MaRDI portal
Publication:5898103
DOI10.1007/11599371zbMATH Open1154.94442OpenAlexW4376546205MaRDI QIDQ5898103FDOQ5898103
Gaoli Wang, Hongbo Yu, Guoyan Zhang, Xiaoyun Wang
Publication date: 14 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11599371
Cited In (12)
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
- MD4 is Not One-Way
- Second Preimage Attacks on Dithered Hash Functions
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
- Quantum and semi-quantum lottery: strategies and advantages
- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256
- New Second Preimage Attack Variants against the MD-Structure
- Collisions of MMO-MD5 and Their Impact on Original MD5
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
Recommendations
This page was built for publication: Cryptology and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5898103)