The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase SHA-0 (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2005 (15) 2006-2009 (16) 2010-2023 (15)
Publication types (Num. hits)
article(19) incollection(1) inproceedings(26)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 33 occurrences of 18 keywords

Results
Found 50 publication records. Showing 46 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
120Kazumaro Aoki, Yu Sasaki Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-1, preimage, one-way, meet-in-the-middle, SHA-0
97Christophe De Cannière, Christian Rechberger Preimages for Reduced SHA-0 and SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF directed random graph, cryptanalysis, hash function, SHA-1, preimages, SHA-0
89Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
81Stéphane Manuel, Thomas Peyrin Collisions on SHA-0 in One Hour. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, SHA-0, boomerang attack
81Xiaoyun Wang 0001, Hongbo Yu, Yiqun Lisa Yin Efficient Collision Search Attacks on SHA-0. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Collision search attacks, Hash functions, SHA-1, SHA-0
78Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby Collisions of SHA-0 and Reduced SHA-1. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
76Xiaoyun Wang 0001, Yiqun Lisa Yin, Hongbo Yu Finding Collisions in the Full SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collision search attacks, Hash functions, SHA-1, SHA-0
73Roshni Chatterjee, Moiz A. Saifee, Dipanwita Roy Chowdhury Modifications of SHA-0 to Prevent Attacks. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
73Eli Biham, Rafi Chen Near-Collisions of SHA-0. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
68Somitra Kumar Sanadhya, Palash Sarkar 0001 Attacking Reduced Round SHA-256. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Florent Chabaud, Antoine Joux Differential Collisions in SHA-0. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
50Yusuke Naito 0001, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta Improved Collision Search for SHA-0. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Helena Handschuh SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm). Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
45Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Impact of Rotations in SHA-1 and Related Hash Functions. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Donghoon Chang, Kishan Chand Gupta, Mridul Nandi RC4-Hash: A New Hash Function Based on RC4. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash Function, Collision Attack, RC4, Preimage Attack
34Lars R. Knudsen SMASH - A Cryptographic Hash Function. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Eli Biham, Rafi Chen, Antoine Joux Cryptanalysis of SHA-0 and Reduced SHA-1. Search on Bibsonomy J. Cryptol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Tim Polk, Lily Chen, Sean Turner, Paul E. Hoffman Security Considerations for the SHA-0 and SHA-1 Message-Digest Algorithms. Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
33Praveen Gauravaram, William Millan, Juanma González Nieto Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
23Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path
23Antoine Joux, Thomas Peyrin Hash Functions and the (Amplified) Boomerang Attack. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, SHA-1, boomerang attack
23Scott Contini, Yiqun Lisa Yin Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Merkle-Damgård construction, MBCA, 3C, 3C+
23Yu Sasaki, Yusuke Naito 0001, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta How to Construct Sufficient Conditions for Hash Functions. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Shuang Wu 0004, Dengguo Feng, Wenling Wu New Disturbance Vector for SHA-0 Collision. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2010 DBLP  BibTeX  RDF
16Yusuke Naito 0001, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta Message Modification for Step 21-23 on SHA-0. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
16Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida Complexity of Differential Attacks on SHA-0 with Various Message Schedules. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
16Eli Biham, Rafi Chen Near-Collisions of SHA-0. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
11Ahto Buldas, Sven Laur Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shang Gao 0010, Shijie Pan, Yuguang Yang 0001 Quantum algorithm for kernelized correlation filter. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Shang Gao 0010, Shijie Pan, Guang-Bao Xu, Yu-Guang Yang 0001 Quantum average neighborhood margin maximization for feature extraction. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Yu-Guang Yang 0001, Hong-Mei Fu, Shang Gao 0010, Yi-Hua Zhou 0001, Wei-Min Shi Intrusion detection: A model based on the improved vision transformer. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yu-Guang Yang 0001, Guo-Dong Cao, Rui-Chen Huang, Shang Gao 0010, Yi-Hua Zhou 0001, Wei-Min Shi, Guang-Bao Xu Multiparty anonymous quantum communication without multipartite entanglement. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Manik Gupta, Bhisham Sharma, Akarsh Tripathi, Shashank Singh 0010, Abhishek Bhola, Rajani Singh, Ashutosh Dhar Dwivedi n-Player Stochastic Duel Game Model with Applied Deep Learning and Its Modern Implications. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
1Yu-Guang Yang 0001, Xiao-Xiao Liu, Shang Gao 0010, Yihua Zhou 0001, Wei-Min Shi, Jian Li 0035, Dan Li 0018 Detector-device-independent quantum secret sharing based on hyper-encoding and single-photon Bell-state measurement. Search on Bibsonomy Quantum Eng. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yu-Guang Yang 0001, Xiao-Xiao Liu, Shang Gao 0010, Xiu-Bo Chen, Dan Li 0018, Yi-Hua Zhou 0001, Wei-Min Shi A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yu-Guang Yang 0001, Shang Gao 0010, Dan Li 0018, Yi-Hua Zhou 0001, Wei-Min Shi Three-party quantum secret sharing against collective noise. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yu-Guang Yang 0001, Shang Gao 0010, Dan Li 0018, Yi-Hua Zhou 0001, Wei-Min Shi Two-party quantum key agreement over a collective noisy channel. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Shaohua Wang 0010 Intensive evaluation and development strategies of tourist attractions' land utilization - A case study of Gulou District in the City of Kaifeng. Search on Bibsonomy Geoinformatics The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shaohua Wang 0010 The evaluation and research on Chinese ancient passes as tourist resources - A case study of the ancient passes in Shanxi Province. Search on Bibsonomy Geoinformatics The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Judee K. Burgoon, Douglas P. Twitchell, Matthew L. Jensen, Thomas O. Meservy, Mark Adkins, John Kruse, Amit V. Deokar, Gabriel Tsechpenakis, Shan Lu 0010, Dimitris N. Metaxas, Jay F. Nunamaker Jr., Robert Younger Detecting Concealment of Intent in Transportation Screening: A Proof of Concept. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shan Lu 0010, Gabriel Tsechpenakis, Dimitris N. Metaxas, Matthew L. Jensen, John Kruse Blob Analysis of the Head and Hands: A Method for Deception Detection. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Judee K. Burgoon, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker Jr., Shan Lu 0010, Gabriel Tsechpenakis, Dimitris N. Metaxas, Robert Younger An Approach for Intent Identification by Building on Deception Detection. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Shan Lu 0010, Dimitris N. Metaxas, Dimitris Samaras, John Oliensis Using Multiple Cues for Hand Tracking and Model Refinement. Search on Bibsonomy CVPR (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #46 of 46 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license