Cryptology and Network Security
From MaRDI portal
Publication:5898103
DOI10.1007/11599371zbMath1154.94442OpenAlexW4376546205MaRDI QIDQ5898103
Gaoli Wang, Hongbo Yu, Guoyan Zhang, Xiaoyun Wang
Publication date: 14 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11599371
Related Items
Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ Quantum and semi-quantum lottery: strategies and advantages ⋮ On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak ⋮ Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL ⋮ MD4 is Not One-Way ⋮ Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL ⋮ Collisions of MMO-MD5 and Their Impact on Original MD5 ⋮ Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures ⋮ Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 ⋮ Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL