The following pages link to (Q4279583):
Displaying 40 items.
- Arbitrated unconditionally secure authentication scheme with multi-senders (Q293236) (← links)
- Cryptanalysis of full \texttt{RIPEMD-128} (Q321321) (← links)
- A structure-based chaotic hashing scheme (Q327795) (← links)
- An analysis of the blockcipher-based hash functions from PGV (Q604636) (← links)
- RIPEMD with two-round compress function is not collision-free (Q676830) (← links)
- Analysis and improvement of a chaos-based hash function construction (Q718239) (← links)
- Open problems in hash function security (Q887443) (← links)
- A fast software one-way hash function (Q918189) (← links)
- On-line/off-line digital signatures (Q1912770) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- Simple hash function using discrete-time quantum walks (Q1993832) (← links)
- Quantum algorithm to find invariant linear structure of \(MD\) hash functions (Q2018202) (← links)
- Cryptanalysis of SHA-0 and reduced SHA-1 (Q2018819) (← links)
- A quantum hash function with grouped coarse-grained boson sampling (Q2102295) (← links)
- Cryptanalysis of MD2 (Q2267363) (← links)
- Hash function based on quantum walks (Q2322065) (← links)
- Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD (Q2637303) (← links)
- Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL (Q2889860) (← links)
- Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles (Q2889880) (← links)
- The NIST SHA-3 Competition: A Perspective on the Final Year (Q3011930) (← links)
- Fast Hashing on the Pentium (Q3452359) (← links)
- Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function (Q3506389) (← links)
- MD4 is Not One-Way (Q3525692) (← links)
- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru (Q3525694) (← links)
- How to Fill Up Merkle-Damgård Hash Functions (Q3600380) (← links)
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures (Q3627429) (← links)
- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others (Q3634495) (← links)
- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL (Q3637128) (← links)
- A fast new DES implementation in software (Q4639346) (← links)
- Fast Hashing and Stream Encryption with Panama (Q4639441) (← links)
- New Constructions for Secure Hash Functions (Q4639447) (← links)
- On the Design and Security of RC2 (Q4639450) (← links)
- The First Two Rounds of MD4 are Not One-Way (Q4639455) (← links)
- Collision Resistant Double-Length Hashing (Q4933214) (← links)
- A Data Concealing Technique with Random Noise Disturbance and a Restoring Technique for the Concealed Data by Stochastic Process Estimation (Q4964359) (← links)
- Merging Variables: One Technique of Search in Pseudo-Boolean Optimization (Q5214427) (← links)
- A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map (Q5357150) (← links)
- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL (Q5385522) (← links)
- The Delicate Issues of Addition with Respect to XOR Differences (Q5452258) (← links)
- New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 (Q5458595) (← links)