The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase second-preimage (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2004-2008 (26) 2009-2011 (16) 2012-2017 (16) 2018-2019 (4)
Publication types (Num. hits)
article(16) incollection(3) inproceedings(43)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 76 occurrences of 39 keywords

Results
Found 62 publication records. Showing 62 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
154Takanori Isobe 0001, Kyoji Shibutani Preimage Attacks on Reduced Tiger and SHA-2. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger
148Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang 0001 The Second-Preimage Attack on MD4. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collision differential path, weak message, Hash function, second-preimage
146Elena Andreeva 0001, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer Second Preimage Attacks on Dithered Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Hash Function, Dithering
134Phillip Rogaway, Thomas Shrimpton Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF preimage resistance, second-preimage resistance, provable security, cryptographic hash functions, collision resistance
103Gaoli Wang, Shaohui Wang Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key-recovery, HMAC, second preimage attack, NMAC, HAVAL
88Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume Digital Signatures Out of Second-Preimage Resistant Hash Functions. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF second-preimage resistance, provable security, Merkle signatures
86Florian Mendel, Norbert Pramstaller, Christian Rechberger A (Second) Preimage Attack on the GOST Hash Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, preimage attack
77Yu Sasaki Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DMMD, collision, HMAC, second preimage, AURORA
75Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, John Kelsey Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Herding attack, Trojan message attack, Zipper hash, Concatenated hash, Tree hash, Second preimage attack
75Kota Ideguchi, Dai Watanabe Second Preimage Attack on SHAMATA-512. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHAMATA, hash function, second preimage attack, SHA-3 candidate
75Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu Distinguishing and Second-Preimage Attacks on CBC-Like MACs. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CBC, MAC, Distinguishing attack, Second preimage attack
73Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL
60Florian Mendel, Christian Rechberger, Martin Schläffer Cryptanalysis of Twister. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Twister, hash function, collision-, preimage attack, SHA-3, second-preimage-
60Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt Cryptanalysis of the GOST Hash Function. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, collision attack, preimage attack, second preimage attack
52Norbert Pramstaller, Mario Lamberger, Vincent Rijmen Second Preimages for Iterated Hash Functions and Their Implications on MACs. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions
47Kan Yasuda How to Fill Up Merkle-Damgård Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Merkle-Damgård, second-preimage resistance, one-wayness, hash function, padding
46Jian Zou, Wenling Wu, Shuang Wu 0004, Le Dong Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2014 DBLP  BibTeX  RDF
46Deukjo Hong, Bonwook Koo, Dong-Chan Kim Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
46Jian Zou, Wenling Wu, Shuang Wu 0004, Le Dong Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
46Phillip Rogaway, Thomas Shrimpton Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
45John Kelsey, Bruce Schneier Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Second Preimages for SMASH. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SMASH, cryptanalysis, hash functions, second preimages
30Donghoon Chang, Mridul Nandi Improved Indifferentiability Security Analysis of chopMD Hash Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Elena Andreeva 0001, Gregory Neven, Bart Preneel, Thomas Shrimpton Seven-Property-Preserving Iterated Hashing: ROX. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu 0001 Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ROX, ESh, Hash Functions, MPP, Domain Extension
28Eli Biham New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen The Grindahl Hash Functions. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, AES, Rijndael, proposal, design strategy
28Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002, Soo Hak Sung Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Daniel J. Bernstein, Andreas Hülsing Decisional second-preimage resistance: When does SPR imply PRE? Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
26Ian McQuoid, Trevor Swope, Mike Rosulek Characterizing Collision and Second-Preimage Resistance in Linicrypt. Search on Bibsonomy TCC (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Daniel J. Bernstein, Andreas Hülsing Decisional Second-Preimage Resistance: When Does SPR Imply PRE? Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Ian McQuoid, Trevor Swope, Mike Rosulek Characterizing Collision and Second-Preimage Resistance in Linicrypt. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
26Zhenzhen Bao, Lei Wang 0031, Jian Guo 0001, Dawu Gu Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
26Zhenzhen Bao, Lei Wang 0031, Jian Guo 0001, Dawu Gu Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. Search on Bibsonomy CRYPTO (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer New Second-Preimage Attacks on Hash Functions. Search on Bibsonomy J. Cryptol. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Gautham Sekar, Soumyadeep Bhattacharya Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions. Search on Bibsonomy J. Inf. Process. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Muhammad Barham, Orr Dunkelman, Stefan Lucks, Marc Stevens 0001 New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity. Search on Bibsonomy SAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Shiwei Chen, Chenhui Jin A second preimage attack on zipper hash. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Jian Guo 0001, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang 0031 The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
26Riham AlTawy, Amr M. Youssef Second Preimage Analysis of Whirlwind. Search on Bibsonomy Inscrypt The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Jian Guo 0001, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang 0031 The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Tuomas Kortelainen, Juha Kortelainen New Second Preimage Attack Variants against the MD-Structure. Search on Bibsonomy CANS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Gautham Sekar, Soumyadeep Bhattacharya Practical (Second) Preimage Attacks on TCS_SHA-3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
26Charles Bouillaguet, Bastien Vayssière Provable Second Preimage Resistance Revisited. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Lei Wang 0031, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Bart Preneel Second Preimage Resistance. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26 Everywhere Second Preimage Resistant Hash Function (esec). Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Lei Wang 0031, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach. Search on Bibsonomy CT-RSA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Christian Rechberger Second-Preimage Analysis of Reduced SHA-1. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Shiwei Chen, Chenhui Jin A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
26Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
26Charles Bouillaguet, Pierre-Alain Fouque, Adi Shamir, Sébastien Zimmer Second Preimage Attacks on Dithered Hash Functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
26Bart Preneel Second preimage resistance. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Jianyong Huang, Jennifer Seberry, Willy Susilo On the Internal Structure of Alpha-MAC. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Praveen Gauravaram, Lars R. Knudsen On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Davies-Meyer, RMX, Digital signatures, Hash functions
17Dmitry Khovratovich Two Attacks on RadioGatún. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sponge, cryptanalysis, hash functions
15Kan Yasuda A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF birthday bound, MAC, message authentication code, unforgeability, unpredictability, domain extension
15Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic Speeding up Collision Search for Byte-Oriented Hash Functions. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Analysis of the Hash Function Design Strategy Called SMASH. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Praveen Gauravaram, John Kelsey Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Emmanuel Bresson, Dario Catalano, Rosario Gennaro Improved On-Line/Off-Line Threshold Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF manual channel, eTCR hash family, randomized hashing, hash function security, Message authentication
Displaying result #1 - #62 of 62 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license