Cryptology and Network Security
From MaRDI portal
Publication:5898103
Recommendations
Cited in
(14)- MD4 is Not One-Way
- Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL
- Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures
- New Second Preimage Attack Variants against the MD-Structure
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL
- Information Security and Cryptology - ICISC 2005
- Collisions of MMO-MD5 and their impact on original MD5
- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256
- Second Preimage Attacks on Dithered Hash Functions
- New Message Difference for MD4
- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak
- Quantum and semi-quantum lottery: strategies and advantages
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD
This page was built for publication: Cryptology and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5898103)