The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase SHA-1 (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-1995 (17) 1996-1998 (27) 1999-2000 (33) 2001 (37) 2002 (29) 2003 (53) 2004 (51) 2005 (86) 2006 (135) 2007 (119) 2008 (130) 2009 (133) 2010 (118) 2011 (138) 2012 (156) 2013 (186) 2014 (182) 2015 (221) 2016 (253) 2017 (278) 2018 (274) 2019 (358) 2020 (430) 2021 (446) 2022 (463) 2023 (563) 2024 (120)
Publication types (Num. hits)
article(2611) book(1) incollection(12) inproceedings(2361) phdthesis(12) proceedings(39)
Venues (Conferences, Journals, ...)
CoRR(643) IEEE Access(76) INFOCOM(50) GLOBECOM(45) CDC(42) AAAI(40) IACR Cryptol. ePrint Arch.(37) VCIP(37) IEEE Internet Things J.(34) IEEE Trans. Mob. Comput.(33) HSCC(31) ICRA(30) IEEE Trans. Veh. Technol.(29) IJCAI(29) ISBI(29) Inf. Sci.(27) More (+10 of total 1319)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 480 occurrences of 313 keywords

Results
Found 5124 publication records. Showing 5036 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
120Kazumaro Aoki, Yu Sasaki Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-1, preimage, one-way, meet-in-the-middle, SHA-0
118Akashi Satoh Hardware Architecture and Cost Estimates for Breaking SHA-1. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
104Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai Algebraic Cryptanalysis of 58-Round SHA-1. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Gröbner basis, SHA-1, differential attack
97Christophe De Cannière, Christian Rechberger Preimages for Reduced SHA-0 and SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF directed random graph, cryptanalysis, hash function, SHA-1, preimages, SHA-0
92Xiaoyun Wang 0001, Yiqun Lisa Yin, Hongbo Yu Finding Collisions in the Full SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collision search attacks, Hash functions, SHA-1, SHA-0
89Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
78Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby Collisions of SHA-0 and Reduced SHA-1. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
78Roar Lien, Tim Grembowski, Kris Gaj A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
78Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
73Mooseop Kim, Youngse Kim, Jaecheol Ryou 0001, Sungik Jun Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted Computing. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
70Michael Szydlo, Yiqun Lisa Yin Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF signature, MD5, SHA-1, padding, hash collision
70Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Exploiting Coding Theory for Collision Attacks on SHA-1. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF low-weight vector, cryptanalysis, hash function, collision, Linear code, SHA-1
68Somitra Kumar Sanadhya, Palash Sarkar 0001 Attacking Reduced Round SHA-256. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
65Xiaoyun Wang 0001, Hongbo Yu, Yiqun Lisa Yin Efficient Collision Search Attacks on SHA-0. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Collision search attacks, Hash functions, SHA-1, SHA-0
62Mooseop Kim, Jaecheol Ryou 0001, Sungik Jun Compact Implementation of SHA-1 Hash Function for Mobile Trusted Module. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Mooseop Kim, Jaecheol Ryou 0001 Power Efficient Hardware Architecture of SHA-1 Algorithm for Trusted Mobile Computing. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Impact of Rotations in SHA-1 and Related Hash Functions. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
62Helena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw Analysis of SHA-1 in Encryption Mode. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
58Markku-Juhani Olavi Saarinen Cryptanalysis of Block Ciphers Based on SHA-1 and MD5. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SHACAL, Dedicated hash functions, MDC, MD5, SHA-1, Slide attacks
57Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis Cost-Efficient SHA Hardware Accelerators. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
53William E. Burr Cryptographic Hash Standards: Where Do We Go from Here? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hash function attack, cryptography, hash function, SHA-1, NIST
50Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis Rescheduling for Optimized SHA-1 Calculation. Search on Bibsonomy SAMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Christophe De Cannière, Christian Rechberger Finding SHA-1 Characteristics: General Results and Applications. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Krystian Matusiewicz, Josef Pieprzyk Finding Good Differential Patterns for Attacks on SHA-1. Search on Bibsonomy WCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Zeyad A. Al-Odat, Assad Abbas, Samee U. Khan Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA. Search on Bibsonomy FIT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
49Shay Gueron Speeding Up SHA-1, SHA-256 and SHA-512 on the 2nd Generation Intel® Core™ Processors. Search on Bibsonomy ITNG The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
49Helena Handschuh SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm). Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Vlastimil Klíma, Danilo Gligoroski Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
47Jun Yajima, Terutoshi Iwasaki, Yusuke Naito 0001, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta A strict evaluation method on the number of conditions for the SHA-1 collision search. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF disturbance vector, hash function, collision attack, SHA-1
46Jin-Oh Jeon, Su-Bong Ryu, Sang-Jo Park, Min-Sup Kang Strong Authentication Protocol for RFID Tag Using SHA-1 Hash Algorithm. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Strong authentication protocol, SHA-1 hash algorithm, Three-way challenge response, ISO/IEC 1800-3 standard, Digital Codec design, RFID Tag
45Hongbo Yu, Xiaoyun Wang 0001 Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MAC, distinguishing attack, SHA-256
45Athanasios Kakarountas, Haralambos Michail, Athanasios Milidonis, Costas E. Goutis, George Theodoridis High-Speed FPGA Implementation of Secure Hash Algorithm for IPSec and VPN Applications. Search on Bibsonomy J. Supercomput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF high-speed performance, Security, FPGA, hash function, hardware implementation
45Akashi Satoh, Tadanobu Inoue ASIC-Hardware-Focused Comparison for Hash Functions MD5, RIPEMD-160, and SHS. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Jin Zhi, Chung-Horng Lung, Xia Xu, Anand Srinivasan, Yi Lei Securing RSVP and RSVP-TE signaling protocols and their performance study. Search on Bibsonomy ITRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Nicolas Sklavos 0001, Odysseas G. Koufopavlou On the hardware implementations of the SHA-2 (256, 384, 512) hash functions. Search on Bibsonomy ISCAS (5) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
45Junko Nakajima, Mitsuru Matsui Performance Analysis and Parallel Implementation of Dedicated Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF dedicated hash functions, Pentium III, parallel implementations
45Florent Chabaud, Antoine Joux Differential Collisions in SHA-0. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
42Xiaoyun Wang 0001, Wei Wang 0035, Keting Jia, Meiqin Wang New Distinguishing Attack on MAC Using Secret-Prefix Method. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secret prefix method, MAC, distinguishing attack, SHA-1
42Antoine Joux, Thomas Peyrin Hash Functions and the (Amplified) Boomerang Attack. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, SHA-1, boomerang attack
42Charanjit S. Jutla, Anindya C. Patthak Provably Good Codes for Hash Function Design. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF linear codes, SHA-1, minimum distance, collision-resistant hash functions
42Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Asymmetric Signature, C *, C *-, Hidden Monomial Problem, Side Channel Attacks, SHA-1, SFLASH
39Christophe De Cannière, Florian Mendel, Christian Rechberger Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Jens-Peter Kaps, Berk Sunar Energy Comparison of AES and SHA-1 for Ubiquitous Computing. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Haralambos Michail, Athanasios Kakarountas, George N. Selimis, Costas E. Goutis Optimizing SHA-1 Hash Function for High Throughput with a Partial Unrolling Study. Search on Bibsonomy PATMOS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Diana Toma, Dominique Borrione Formal Verification of a SHA-1 Circuit Core Using ACL2. Search on Bibsonomy TPHOLs The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Haralambos Michail, Athanasios P. Kakarountas, Odysseas G. Koufopavlou, Constantinos E. Goutis A low-power and high-throughput implementation of the SHA-1 hash function. Search on Bibsonomy ISCAS (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Vincent Rijmen, Elisabeth Oswald Update on SHA-1. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions
39Mao-Yin Wang, Chih-Pin Su, Chih-Tsun Huang, Cheng-Wen Wu An HMAC processor with integrated SHA-1 and MD5 algorithms. Search on Bibsonomy ASP-DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
34Charanjit S. Jutla, Anindya C. Patthak Provably Good Codes for Hash Function Design. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Mario Lamberger, Florian Mendel Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3
34Bart Preneel The State of Hash Functions and the NIST SHA-3 Competition. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Christian Rechberger, Vincent Rijmen On Authentication with HMAC and Non-random Properties. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Norbert Pramstaller, Christian Rechberger, Vincent Rijmen A compact FPGA implementation of the hash function whirlpool. Search on Bibsonomy FPGA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF compact hardware implementation, FPGA, hash function, whirlpool
34Martin Feldhofer, Christian Rechberger A Case Against Currently Used Hash Functions in RFID Protocols. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee 0002, Seokhie Hong, Jaesang Lee 0002, Dukjae Moon, Sungtaek Chee A New Dedicated 256-Bit Hash Function: FORK-256. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 256-bit Hash Function, FORK-256
34Donghoon Chang, Kishan Chand Gupta, Mridul Nandi RC4-Hash: A New Hash Function Based on RC4. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash Function, Collision Attack, RC4, Preimage Attack
34Marco Macchetti, Luigi Dadda Quasi-Pipelined Hash Circuits. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
34Lars R. Knudsen SMASH - A Cryptographic Hash Function. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Gaëtan Leurent, Thomas Peyrin SHA-1 is a Shambles - First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
33Gaëtan Leurent, Thomas Peyrin SHA-1 is a Shambles: First Chosen-Prefix Collision on SHA-1 and Application to the PGP Web of Trust. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2020 DBLP  BibTeX  RDF
33Harris E. Michail, Georgios Athanasiou, George Theodoridis, Andreas Gregoriades, Costas E. Goutis Design and implementation of totally-self checking SHA-1 and SHA-256 hash functions' architectures. Search on Bibsonomy Microprocess. Microsystems The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Harris E. Michail, George Athanasiou, Vasilios I. Kelefouras, George Theodoridis, Thanos Stouraitis, Costas E. Goutis Area-Throughput Trade-Offs for SHA-1 and SHA-256 Hash Functions' Pipelined Designs. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Yunshan Hu, Yi Shen, Guang Zeng, Wenbao Han SHA-1充分条件自动化求解算法 (New Algorithm for Automatic Deriving Sufficient Conditions of SHA-1). Search on Bibsonomy 计算机科学 The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Eli Biham, Rafi Chen, Antoine Joux Cryptanalysis of SHA-0 and Reduced SHA-1. Search on Bibsonomy J. Cryptol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Mooseop Kim, Deok-Gyu Lee, Jaecheol Ryou 0001 Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33George Athanasiou, George Theodoridis, Costas E. Goutis, Harris E. Michail, Takis Kasparis A Systematic Flow for Developing Totally Self-Checking Architectures for SHA-1 and SHA-2 Cryptographic Hash Families. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Franklin Magalhães Ribeiro Junior, Edward David Moreno, Wanderson Roger Azevedo Dias, Felipe dos Anjos Lima Cache performance analysis of SHA-3 hashing algorithm (BLAKE) and SHA-1. Search on Bibsonomy CLEI The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Jun-Cheol Jeon, Kang-Joong Seo, Kee-Won Kim Hardware complexity of SHA-1 and SHA-256 based on area and time analysis. Search on Bibsonomy ICOIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Mohsen Bahramali, Jin Jiang 0001, Arash Reyhani-Masoleh A Fault Detection Scheme for the FPGA Implementation of SHA-1 and SHA-512 Round Computations. Search on Bibsonomy J. Electron. Test. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Tim Polk, Lily Chen, Sean Turner, Paul E. Hoffman Security Considerations for the SHA-0 and SHA-1 Message-Digest Algorithms. Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33James Docherty, Albert Koelmans A flexible hardware implementation of SHA-1 and SHA-2 Hash Functions. Search on Bibsonomy ISCAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
33Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
33Praveen Gauravaram, William Millan, Juanma González Nieto Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
31Christian Rechberger, Vincent Rijmen, Nicolas Sklavos 0001 The NIST Cryptographic Workshop on Hash Functions. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, cryptanalysis, hash functions, SHA-1
28Xia Hong 0002, Ning Hui-ming, Yan Jiang-yu The Realization and Optimization of Secure Hash Algorithm (SHA-1) Based on LEON2 Coprocessor. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Jun Yajima, Yu Sasaki, Yusuke Naito 0001, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta A New Strategy for Finding a Differential Path of SHA-1. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen The Impact of Carries on the Complexity of Collision Attacks on SHA-1. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede Throughput Optimized SHA-1 Architecture Using Unfolding Transformation. Search on Bibsonomy ASAP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Ray C. C. Cheung, Çetin Kaya Koç, John D. Villasenor A High-Performance Hardware Architecture for Spectral Hash Algorithm. Search on Bibsonomy ASAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Pierre-Alain Fouque, Gaëtan Leurent, Denis Réal, Frédéric Valette Practical Electromagnetic Template Attack on HMAC. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Deepak Sreedharan, Ali Akoglu A hybrid processing element based reconfigurable architecture for hashing algorithms. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Martin Feldhofer, Johannes Wolkerstorfer Strong Crypto for RFID Tags - A Comparison of Low-Power Hardware Implementations. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Praveen Gauravaram, Katsuyuki Okeya An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC
23Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path
23Orr Dunkelman, Nathan Keller, Jongsung Kim Related-Key Rectangle Attack on the Full SHACAL-1. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Scott Contini, Yiqun Lisa Yin Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Merkle-Damgård construction, MBCA, 3C, 3C+
23Yu Sasaki, Yusuke Naito 0001, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta How to Construct Sufficient Conditions for Hash Functions. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya Merkle-Damgård Revisited: How to Construct a Hash Function. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Witold Litwin, Thomas J. E. Schwarz Algebraic Signatures for Scalable Distributed Data Structures. Search on Bibsonomy ICDE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram Towards Making Luby-Rackoff Ciphers Optimal and Practical. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
23Toshio Hasegawa, Junko Nakajima, Mitsuru Matsui A Practical Implementation of Elliptic Curve Cryptosystems over GF(p) on a 16-bit Microcomputer. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Antoon Bosselaers, René Govaerts, Joos Vandewalle SHA: A Design for Parallel Architectures? Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF multiple-issue architectures, instruction-level parallelism, Cryptographic hash functions, critical path analysis
19Peng Li 0032, Xin Yang 0001, Kai Cao 0001, Peng Shi 0004, Jie Tian 0001 Security-Enhanced Fuzzy Fingerprint Vault Based on Minutiae's Local Ridge Information. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cross-matching, Minutiae descriptor, Hermit’s interpolation polynomial, SHA-1, Fuzzy vault
19Yifei Liu, Timo Kasper, Kerstin Lemke-Rust, Christof Paar E-Passport: Cracking Basic Access Control Keys. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MRTD, Basic Access Control, Key Search Machine, COPACOBANA, DES, SHA-1, E-Passport
16Degang Li, Yang Yang, Guang Zeng Search framework for neutral bits and boomerangs in SHA-1 collision attacks. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Hayder Al-Ghanimi, Mohammed Q. Mohammed, Malik Kareem Kadhim Alzeyadi, Tamarah Alaa Diame, Faris Hassan Taha Aldabbagh, Mustafa Altaee Detection of Attacks by Assessing the Performance of MD2, MD5 and SHA-1 Hashing Algorithms. Search on Bibsonomy IC3I The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Gurvir Kaur, Kuldeepak Singh, Harsimranjit Singh Gill Chaos-based joint speech encryption scheme using SHA-1. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Loganaden Velvindron, Kathleen Moriarty, Alessandro Ghedini Deprecating MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2. Search on Bibsonomy RFC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 5036 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license