|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 26 occurrences of 13 keywords
|
|
|
Results
Found 17 publication records. Showing 17 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
127 | Yu Sasaki |
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 79-94, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wide pipe, pseudo-preimage, hash, preimage, truncate, meet-in-the-middle, HAVAL |
104 | Yu Sasaki, Kazumaro Aoki |
A Preimage Attack for 52-Step HAS-160. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 302-317, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
HAS-160, splice-and-cut, hash function, preimage, one-way, local collision |
64 | Florian Mendel, Norbert Pramstaller, Christian Rechberger |
A (Second) Preimage Attack on the GOST Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 224-234, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, preimage attack |
51 | Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 |
Preimages for Step-Reduced SHA-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 578-597, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256 |
51 | Lars R. Knudsen, John Erik Mathiassen |
Preimage and Collision Attacks on MD2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 255-267, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Jian Zou, Wenling Wu, Shuang Wu 0004, Le Dong |
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Sci. Eng. ![In: J. Inf. Sci. Eng. 30(6), pp. 1789-1806, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
48 | Jian Zou, Wenling Wu, Shuang Wu 0004, Le Dong |
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 686, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
46 | Yu Sasaki, Kazumaro Aoki |
Finding Preimages in Full MD5 Faster Than Exhaustive Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 134-152, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
splice-and-cut, hash function, MD5, preimage, one-way, local collision |
32 | Gaëtan Leurent |
MD4 is Not One-Way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 412-428, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, preimage, MD4, one-way |
28 | Bingke Ma, Bao Li 0001, Ronglin Hao, Xiaoqian Li |
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions (Full Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 569, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
28 | Bingke Ma, Bao Li 0001, Ronglin Hao, Xiaoqian Li |
Improved (Pseudo) Preimage Attacks on Reduced-Round GOST and Grøstl-256 and Studies on Several Truncation Patterns for AES-like Compression Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings, pp. 79-96, 2015, Springer, 978-3-319-22424-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Gaoli Wang, Yanzhao Shen |
(Pseudo-) Preimage Attacks on Step-Reduced HAS-160 and RIPEMD-160. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings, pp. 90-103, 2014, Springer, 978-3-319-13256-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Gaoli Wang |
Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 28(1), pp. 129-143, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Shuang Wu 0004, Dengguo Feng, Wenling Wu, Jian Guo 0001, Le Dong, Jian Zou |
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2012, pp. 206, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
28 | Shuang Wu 0004, Dengguo Feng, Wenling Wu, Jian Guo 0001, Le Dong, Jian Zou |
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers, pp. 127-145, 2012, Springer, 978-3-642-34046-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Çagdas Çalik, Meltem Sönmez Turan |
Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 57, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
28 | Çagdas Çalik, Meltem Sönmez Turan |
Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LATINCRYPT ![In: Progress in Cryptology - LATINCRYPT 2010, First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings, pp. 205-221, 2010, Springer, 978-3-642-14711-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #17 of 17 (100 per page; Change: )
|
|