|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 41 occurrences of 23 keywords
|
|
|
Results
Found 49 publication records. Showing 49 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
96 | Florian Mendel, Vincent Rijmen |
Cryptanalysis of the Tiger Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 536-550, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
pseudo-collision, pseudo-near-collision, Cryptanalysis, hash functions, collision, differential attack, near-collision |
65 | Hongbo Yu, Xiaoyun Wang 0001 |
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 206-226, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multi-collision, multi-near-collision, Hash function, sufficient condition, differential path |
49 | Florian Mendel, Norbert Pramstaller, Christian Rechberger |
Improved Collision Attack on the Hash Function Proposed at PKC'98. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, pp. 8-21, 2006, Springer, 3-540-49112-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, collision, collision attack, differential attack, near-collision |
42 | Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer |
Rebound Distinguishers: Results on the Full Whirlpool Compression Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 126-143, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, distinguisher, near-collision |
38 | Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen |
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 260-276, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Grøstl, Maelstrom, hash function, collision attack, Whirlpool, near-collision |
30 | Marc Stevens 0001, Alexander Sotirov, Jacob Appelbaum, Arjen K. Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger |
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 55-69, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
PlayStation 3, certificate, collision attack, MD5 |
29 | Florian Mendel, Bart Preneel, Vincent Rijmen, Hirotaka Yoshida, Dai Watanabe |
Update on Tiger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 63-79, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Ivica Nikolic, Alex Biryukov |
Collisions for Step-Reduced SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 1-15, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai |
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 16-31, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
IND-CCA security, encapsulation, public key encryption, identity-based encryption, pseudorandom generator |
24 | Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings, pp. 237-253, 2008, Springer, 978-3-540-78966-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision |
24 | Donghoon Chang |
Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 478, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
24 | Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida |
Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 325, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
22 | Alex Biryukov, Praveen Gauravaram, Jian Guo 0001, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang |
Cryptanalysis of the LAKE Hash Family. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 156-179, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Scott Contini, Krystian Matusiewicz, Josef Pieprzyk |
Extending FORK-256 Attack to the Full Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 296-305, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Florian Mendel |
Two Passes of Tiger Are Not One-Way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 29-40, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Attacking Reduced Round SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 130-143, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Xiaoyun Wang 0001, Wei Wang 0035, Keting Jia, Meiqin Wang |
New Distinguishing Attack on MAC Using Secret-Prefix Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 363-374, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
secret prefix method, MAC, distinguishing attack, SHA-1 |
18 | Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk |
Cryptanalysis of FORK-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers, pp. 19-38, 2007, Springer, 978-3-540-74617-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
FORK-256, micro-collisions, cryptanalysis, hash functions |
15 | Satyam Kumar 0002, Sandip Kumar Mondal, Santanu Sarkar 0001, Takanori Isobe 0001, Anubhab Baksi, Avishek Adhikari |
Restricted near collision attack on Plantlet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptogr. Eng. ![In: J. Cryptogr. Eng. 14(1), pp. 19-34, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
15 | Axel Durbet, Paul-Marie Grollemund, Kevin Thiry-Atighehchi |
Untargeted Near-collision Attacks in Biometric Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.01580, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Subhadeep Banik, Daniel Collins 0001, Willi Meier |
Near Collision Attack Against Grain v1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 884, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
15 | Subhadeep Banik, Daniel Collins 0001, Willi Meier |
Near Collision Attack Against Grain V1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS (1) ![In: Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I, pp. 178-207, 2023, Springer, 978-3-031-33487-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Hossein Nick Zinat Matin, Maria Laura Delle Monache |
Near Collision and Controllability Analysis of Nonlinear Optimal Velocity Follow-the-Leader Dynamical Model In Traffic Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: 62nd IEEE Conference on Decision and Control, CDC 2023, Singapore, December 13-15, 2023, pp. 8057-8062, 2023, IEEE, 979-8-3503-0124-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
15 | Joost C. F. de Winter, Jimmy Hu, Bastiaan Petermeijer |
Ipsilateral and contralateral warnings: effects on decision-making and eye movements in near-collision scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Multimodal User Interfaces ![In: J. Multimodal User Interfaces 16(3), pp. 303-317, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Hossein Nick Zinat Matin, Richard B. Sowers |
Near-Collision Dynamics in a Noisy Car-Following Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIAM J. Appl. Math. ![In: SIAM J. Appl. Math. 82(6), pp. 2080-2110, December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
15 | Tibor Jager, Rafael Kurek, David Niehues |
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 160, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
15 | Tibor Jager, Rafael Kurek, David Niehues |
Efficient Adaptively-Secure IB-KEMs and VRFs via Near-Collision Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part I, pp. 596-626, 2021, Springer, 978-3-030-75244-6. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
15 | Gaoli Wang, Fukang Liu, Binbin Cui, Florian Mendel, Christoph Dobraunig |
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 88(5), pp. 887-930, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Senshan Pan, Yueping Wu, Liangmin Wang 0001 |
Optimizing Fast Near Collision Attack on Grain Using Linear Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 181191-181201, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Aashi Manglik, Xinshuo Weng, Eshed Ohn-Bar, Kris M. Kitani |
Future Near-Collision Prediction from Monocular Video: Feasibility, Dataset, and Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1903.09102, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
15 | Bin Zhang 0003, Chao Xu, Willi Meier |
Fast Near Collision Attack on the Grain v1 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 145, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
15 | Bin Zhang 0003, Chao Xu, Willi Meier |
Fast Near Collision Attack on the Grain v1 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (2) ![In: Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part II, pp. 771-802, 2018, Springer, 978-3-319-78374-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
15 | Mengxia Hu, Yibing Li |
Drivers' avoidance patterns in near-collision intersection conflicts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITSC ![In: 20th IEEE International Conference on Intelligent Transportation Systems, ITSC 2017, Yokohama, Japan, October 16-19, 2017, pp. 1-6, 2017, IEEE, 978-1-5386-1526-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
15 | Le Dong, Yanling Wang, Wenling Wu, Jian Zou |
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 9(5), pp. 277-283, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Baris Ege, Thomas Eisenbarth 0001, Lejla Batina |
Near Collision Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 511, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
15 | Baris Ege, Thomas Eisenbarth 0001, Lejla Batina |
Near Collision Side Channel Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Selected Areas in Cryptography - SAC 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers, pp. 277-292, 2015, Springer, 978-3-319-31300-9. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Jürgen Fuß, Stefan Gradinger, Bernhard Greslehner-Nimmervoll, Robert Kolmhofer |
Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: 10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015, pp. 274-280, 2015, IEEE Computer Society, 978-1-4673-6590-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Martha Alvarez-Ramírez, Antonio García 0002 |
Poincaré maps and near-collision dynamics for a restricted planar (n+1)-body problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Math. Comput. ![In: Appl. Math. Comput. 233, pp. 328-337, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Inna Polak, Adi Shamir |
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 417, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
15 | Le Dong, Wenling Wu, Shuang Wu 0004, Jian Zou |
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. ![In: Frontiers Comput. Sci. 8(3), pp. 513-525, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Rui Zou, Zishan Liu, Lin Zhang 0013, Muhammad Kamil |
A near collision free reservation based MAC protocol for VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: IEEE Wireless Communications and Networking Conference, WCNC 2014, Istanbul, Turkey, April 6-9, 2014, pp. 1538-1543, 2014, IEEE, 978-1-4799-3083-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Inna Polak, Adi Shamir |
Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings, pp. 219-236, 2014, Springer, 978-3-319-13038-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Bin Zhang 0003, Zhenqi Li, Dengguo Feng, Dongdai Lin |
Near Collision Attack on the Grain v1 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers, pp. 518-538, 2013, Springer, 978-3-662-43932-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Gustav Markkula, Ola Benderius, Krister Wolff, Mattias Wahde |
A Review of Near-Collision Driver Behavior Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. Factors ![In: Hum. Factors 54(6), pp. 1117-1143, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Hongbo Yu, Jiazhe Chen, Keting Jia, Xiaoyun Wang 0001 |
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 148, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
15 | Dibyendu Mallik, Debdeep Mukhopadhyay |
New Pseudo Near Collision Attack on Tiger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications, pp. 427-430, 2010, SciTePress, 978-989-8425-18-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
15 | Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
Near-Collision Attacks on MD4: Applied to MD4-Based Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1), pp. 76-86, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Hongbo Yu, Xiaoyun Wang 0001 |
Near-Collision Attack on the Compression Function of Dynamic SHA2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 179, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
15 | Meiqin Wang, Xiaoyun Wang 0001, Keting Jia, Wei Wang 0035 |
New Pseudo-Near-Collision Attack on Reduced-Round of Hamsi-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2009, pp. 484, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
Displaying result #1 - #49 of 49 (100 per page; Change: )
|
|