The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase pseudo-collision (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2005-2013 (11)
Publication types (Num. hits)
article(4) inproceedings(7)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 12 occurrences of 8 keywords

Results
Found 11 publication records. Showing 11 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
81Florian Mendel, Vincent Rijmen Cryptanalysis of the Tiger Hash Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudo-collision, pseudo-near-collision, Cryptanalysis, hash functions, collision, differential attack, near-collision
44Hirotaka Yoshida, Alex Biryukov Analysis of a SHA-256 Variant. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SHA-2-XOR, SHACAL-2-XOR, Pseudo-collision resistance, Iterative patterns, Differential cryptanalysis, SHA-256
27Jiho Ryu, Yongho Seok, Nakjung Choi, Taekyoung Kwon 0001, Yanghee Choi S-EDCA: EDCA based on SuperSlot and Pseudo Collision. Search on Bibsonomy ACM SIGMOBILE Mob. Comput. Commun. Rev. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Somitra Kumar Sanadhya, Palash Sarkar 0001 New Collision Attacks against Up to 24-Step SHA-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, Cryptanalysis
22Jian Guo 0001, Krystian Matusiewicz, Lars R. Knudsen, San Ling, Huaxiong Wang Practical Pseudo-collisions for Hash Functions ARIRANG-224/384. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF pseudo-collision, ARIRANG, hash function, practical
17Gaoli Wang, Yanzhao Shen Preimage and pseudo-collision attacks on step-reduced SM3 hash function. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Gaoli Wang, Yanzhao Shen Preimage and Pseudo-Collision Attacks on Step-Reduced SM3 Hash Function. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
17Ji Li, Takanori Isobe 0001, Kyoji Shibutani Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Takanori Isobe 0001, Taizo Shirai Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
16Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk Cryptanalysis of FORK-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FORK-256, micro-collisions, cryptanalysis, hash functions
11Florian Mendel, Vincent Rijmen Weaknesses in the HAS-V Compression Function. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #11 of 11 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license