The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for preimage with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2003 (15) 2004-2005 (19) 2006 (28) 2007-2008 (50) 2009 (56) 2010 (18) 2011 (15) 2012 (22) 2013-2014 (24) 2015-2016 (15) 2017-2018 (16) 2019-2020 (20) 2021-2022 (21) 2023 (17) 2024 (4)
Publication types (Num. hits)
article(144) incollection(5) inproceedings(191)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 213 occurrences of 97 keywords

Results
Found 340 publication records. Showing 340 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
179Takanori Isobe 0001, Kyoji Shibutani Preimage Attacks on Reduced Tiger and SHA-2. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger
133Yu Sasaki, Kazumaro Aoki A Preimage Attack for 52-Step HAS-160. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HAS-160, splice-and-cut, hash function, preimage, one-way, local collision
132Phillip Rogaway, Thomas Shrimpton Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF preimage resistance, second-preimage resistance, provable security, cryptographic hash functions, collision resistance
127Elena Andreeva 0001, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer Second Preimage Attacks on Dithered Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Hash Function, Dithering
119Yu Sasaki, Kazumaro Aoki Preimage Attacks on 3, 4, and 5-Pass HAVAL. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF splice-and-cut, hash function, preimage, one-way, meet-in-the-middle, local collision, HAVAL
119Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang 0001 The Second-Preimage Attack on MD4. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collision differential path, weak message, Hash function, second-preimage
119Yu Sasaki Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wide pipe, pseudo-preimage, hash, preimage, truncate, meet-in-the-middle, HAVAL
93Florian Mendel, Norbert Pramstaller, Christian Rechberger A (Second) Preimage Attack on the GOST Hash Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, preimage attack
93Yu Sasaki, Kazumaro Aoki Preimage Attacks on Step-Reduced MD5. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message Expansion, Hash Function, MD5, Preimage Attack, One-Way, Local Collision
79Yu Sasaki, Kazumaro Aoki Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RIPEMD, double branch, preimage, meet-in-the-middle
79Gaoli Wang, Shaohui Wang Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key-recovery, HMAC, second preimage attack, NMAC, HAVAL
79Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 Preimage Attack on the Parallel FFT-Hashing Function. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF the Parallel FFT-Hashing function, Cryptographic Hash Function, Preimage Attack
73Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen Cryptanalysis of MDC-2. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MDC-2, hash function, collision, preimage
66Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume Digital Signatures Out of Second-Preimage Resistant Hash Functions. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF second-preimage resistance, provable security, Merkle signatures
66Florian Mendel, Christian Rechberger, Martin Schläffer Cryptanalysis of Twister. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Twister, hash function, collision-, preimage attack, SHA-3, second-preimage-
66Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt Cryptanalysis of the GOST Hash Function. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, collision attack, preimage attack, second preimage attack
60Martine Dexet, Eric Andres A Generalized Preimage for the Standard and Supercover Digital Hyperplane Recognition. Search on Bibsonomy DGCI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
60Lars R. Knudsen, John Erik Mathiassen Preimage and Collision Attacks on MD2. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
60Yu Sasaki Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DMMD, collision, HMAC, second preimage, AURORA
60Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 Preimages for Step-Reduced SHA-2. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256
60Mario Lamberger, Florian Mendel Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3
60Yu Sasaki, Kazumaro Aoki Finding Preimages in Full MD5 Faster Than Exhaustive Search. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF splice-and-cut, hash function, MD5, preimage, one-way, local collision
54Masashi Kiyomi, Toshiki Saitoh, Ryuhei Uehara Reconstruction of Interval Graphs. Search on Bibsonomy COCOON The full citation details ... 2009 DBLP  DOI  BibTeX  RDF the graph reconstruction conjecture, polynomial time algorithm, interval graphs
54Christophe De Cannière, Christian Rechberger Preimages for Reduced SHA-0 and SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF directed random graph, cryptanalysis, hash function, SHA-1, preimages, SHA-0
52Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, John Kelsey Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Herding attack, Trojan message attack, Zipper hash, Concatenated hash, Tree hash, Second preimage attack
52Kota Ideguchi, Dai Watanabe Second Preimage Attack on SHAMATA-512. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHAMATA, hash function, second preimage attack, SHA-3 candidate
52Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu Distinguishing and Second-Preimage Attacks on CBC-Like MACs. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CBC, MAC, Distinguishing attack, Second preimage attack
52Kazumaro Aoki, Yu Sasaki Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-1, preimage, one-way, meet-in-the-middle, SHA-0
52Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL
46Chao Li, Qiang Li, San Ling Properties and Applications of Preimage Distributions of Perfect Nonlinear Functions. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Yan Gérard, Fabien Feschet, David Coeurjolly Gift-Wrapping Based Preimage Computation Algorithm. Search on Bibsonomy DGCI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Shuo Sheng, Michael S. Hsiao Success-Driven Learning in ATPG for Preimage Computation. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Bin Li, Michael S. Hsiao, Shuo Sheng A Novel SAT All-Solutions Solver for Efficient Preimage Computation. Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Shuo Sheng, Michael S. Hsiao Efficient Preimage Computation Using A Novel Success-Driven ATPG. Search on Bibsonomy DATE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
46Gaëtan Leurent MD4 is Not One-Way. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, preimage, MD4, one-way
40Florian Mendel Two Passes of Tiger Are Not One-Way. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40Anders Hansson, Gabriel Istrate, Shiva Prasad Kasiviswanathan Combinatorics of TCP reordering. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40John Kelsey, Bruce Schneier Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39 Quantum preimage, 2nd-preimage, and collision resistance of SHA3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
39Ho Gi Jung Support vector number reduction by extending iterative preimage addition using genetic algorithm-based preimage estimation. Search on Bibsonomy Pattern Recognit. Lett. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
39Jian Zou, Wenling Wu, Shuang Wu 0004, Le Dong Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2014 DBLP  BibTeX  RDF
39Deukjo Hong, Bonwook Koo, Dong-Chan Kim Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
39Jian Zou, Wenling Wu, Shuang Wu 0004, Le Dong Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
39Phillip Rogaway, Thomas Shrimpton Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
33Rua-Huan Tsaih, Yat-wah Wan, Shin-Ying Huang The rule-extraction through the preimage analysis. Search on Bibsonomy IJCNN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Martine Dexet, Eric Andres Linear Discrete Line Recognition and Reconstruction Based on a Generalized Preimage. Search on Bibsonomy IWCIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Sanparith Marukatat Sparse Kernel PCA by Kernel K-Means and Preimage Reconstruction Algorithms. Search on Bibsonomy PRICAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Alexandru Turjan, Bart Kienhuis Storage Management in Process Networks using the Lexicographically Maximal Preimage. Search on Bibsonomy ASAP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Kan Yasuda How to Fill Up Merkle-Damgård Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle-Damgård, second-preimage resistance, one-wayness, hash function, padding
33Norbert Pramstaller, Mario Lamberger, Vincent Rijmen Second Preimages for Iterated Hash Functions and Their Implications on MACs. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions
33Donghoon Chang, Kishan Chand Gupta, Mridul Nandi RC4-Hash: A New Hash Function Based on RC4. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash Function, Collision Attack, RC4, Preimage Attack
33Viktor Levandovskyy Intersection of ideals with non-commutative subalgebras. Search on Bibsonomy ISSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF homomorphism of algebras, intersection with subalgebra, non-commutative algebra, preimage of ideal, restriction, elimination, Groebner bases
33Bernhard Möller, Georg Struth Greedy-Like Algorithms in Modal Kleene Algebra. Search on Bibsonomy RelMiCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Idempotent semiring, image and preimage operation, modal operators, Geach formula, program development and analysis, confluence, Kleene algebra
27Ran Canetti, Ronny Ramzi Dakdouk Towards a Theory of Extractable Functions. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Kimmo Halunen, Pauli Rikula, Juha Röning Finding Preimages of Multiple Passwords Secured with VSH. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin Linearization Framework for Collision Attacks: Application to CubeHash and MD6. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CubeHash and MD6, Hash functions, collisions, differential attack, SHA-3
27Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu 0001 Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ROX, ESh, Hash Functions, MPP, Domain Extension
27Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton Salvaging Merkle-Damgård for Practical Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HAS-160, differential cryptanalysis, related-key rectangle attack
27Ran Canetti, Ronny Ramzi Dakdouk Extractable Perfectly One-Way Functions. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Bin Zhang 0015, Chenhui Jin Cryptanalysis of a Chaos-based Stream Cipher. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Donghoon Chang, Mridul Nandi Improved Indifferentiability Security Analysis of chopMD Hash Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo 0001, San Ling, Huaxiong Wang Cryptanalysis of LASH. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Eli Biham New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Elena Andreeva 0001, Gregory Neven, Bart Preneel, Thomas Shrimpton Seven-Property-Preserving Iterated Hashing: ROX. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen The Grindahl Hash Functions. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, AES, Rijndael, proposal, design strategy
27Sylvain Pasini, Serge Vaudenay Hash-and-Sign with Weak Hashing Made Secure. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Second Preimages for SMASH. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SMASH, cryptanalysis, hash functions, second preimages
27Wei-Shi Zheng 0001, Jian-Huang Lai Regularized Locality Preserving Learning of Pre-Image Problem in Kernel Principal Component Analysis. Search on Bibsonomy ICPR (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel Reducing Complexity Assumptions for Statistically-Hiding Commitment. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Frédéric Muller The MD2 Hash Function Is Not One-Way. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002, Soo Hak Sung Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Jacques Patarin Collisions and Inversions for Damgård's Whole Hash Function. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
20Seungjun Baek 0002, Giyoon Kim, Jongsung Kim Preimage Attacks on Reduced-Round Ascon-Xof. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
20Shiyao Chen, Jian Guo 0001, Eik List, Danping Shi, Tianyu Zhang Diving Deep into the Preimage Security of AES-like Hashing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
20Shiyao Chen, Jian Guo 0001, Eik List, Danping Shi, Tianyu Zhang Diving Deep into the Preimage Security of AES-Like Hashing. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Xiyue Zhang, Benjie Wang, Marta Kwiatkowska Provable Preimage Under-Approximation for Neural Networks. Search on Bibsonomy TACAS (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
20Junling Pei, Lusheng Chen Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Yongseong Lee, Jinkeon Kang, Donghoon Chang, Seokhie Hong A preimage attack on reduced GIMLI-HASH with unbalanced squeezing phase. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang Quantum rotational cryptanalysis for preimage recovery of round-reduced Keccak. Search on Bibsonomy Quantum Inf. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Xiyue Zhang, Benjie Wang, Marta Kwiatkowska On Preimage Approximation for Neural Networks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Tianyu Zhang Comprehensive Preimage Security Evaluations on Rijndael-based Hashing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Huina Li, Le He, Shiyao Chen, Jian Guo 0001, Weidong Qiu Automatic Preimage Attack Framework on \ascon Using a Linearize-and-Guess Approach. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Qinggan Fu, Ye Luo, Qianqian Yang 0003, Ling Song 0001 Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Xiaoen Lin, Le He, Hongbo Yu Practical Preimage Attack on 3-Round Keccak-256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20 Improved Preimage Sampling for Lattices. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders Revisiting Preimage Sampling for Lattices. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
20Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang Allocating rotational cryptanalysis-based preimage attack on 4-round Keccak-224 for quantum setting. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Congming Wei, Xiaoyang Dong, Willi Meier, Lingyue Qin, Ximing Fu Differential-Aided Preimage Attacks On Round-Reduced Keccak. Search on Bibsonomy Comput. J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20El Mostafa Kalmoun, Mohamed M. S. Nasser, Matti Vuorinen Numerical computation of a preimage domain for an infinite strip with rectilinear slits. Search on Bibsonomy Adv. Comput. Math. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Huina Li, Le He, Shiyao Chen, Jian Guo 0001, Weidong Qiu Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Zahra Javar, Bruce M. Kapron Preimage Awareness in Linicrypt. Search on Bibsonomy CSF The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Tianyu Zhang Comprehensive Preimage Security Evaluations on Rijndael-Based Hashing. Search on Bibsonomy ACNS Workshops The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang 0001 Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing. Search on Bibsonomy EUROCRYPT (4) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
20Takaki Asanuma, Takanori Isobe 0001 A Proof of Work based on Preimage Problem of Variants of SHA-3 with ASIC Resistance. Search on Bibsonomy J. Inf. Process. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Théo Nancy, Vassili Maillet, Johann Barbier An Analytical Approach to Compute the Exact Preimage of Feed-Forward Neural Networks. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
20Le He, Xiaoen Lin, Hongbo Yu Improved Preimage Attacks on Round-Reduced Keccak-384/512 via Restricted Linear Structures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
20Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang 0001 Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
20Charlotte Lefevre, Bart Mennink Tight Preimage Resistance of the Sponge Construction. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 340 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license