Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Jinmin Zhong, Xuejia Lai |
Improved preimage attack on one-block MD4. |
J. Syst. Softw. |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Gaëlle Largeteau-Skapin, Rita Zrour, Eric Andres, Akihiro Sugimoto, Yukiko Kenmochi |
Optimal consensus set and preimage of 4-connected circles in a noisy environment. |
ICPR |
2012 |
DBLP BibTeX RDF |
|
20 | Yu Sasaki, Lei Wang 0031, Shuang Wu 0004, Wenling Wu |
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Dmitry Khovratovich |
Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings. |
ASIACRYPT |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Ji Li, Takanori Isobe 0001, Kyoji Shibutani |
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2. |
FSE |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Shuang Wu 0004, Dengguo Feng, Wenling Wu, Jian Guo 0001, Le Dong, Jian Zou |
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. |
FSE |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Simon Knellwolf, Dmitry Khovratovich |
New Preimage Attacks against Reduced SHA-1. |
CRYPTO |
2012 |
DBLP DOI BibTeX RDF |
|
20 | Bart Preneel |
Second Preimage Resistance. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Bart Preneel |
Preimage Resistance. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | |
Everywhere Second Preimage Resistant Hash Function (esec). |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Jinmin Zhong, Xuejia Lai |
Preimage Attack on Reduced DHA-256. |
J. Inf. Sci. Eng. |
2011 |
DBLP BibTeX RDF |
|
20 | Lei Wang 0031, Yu Sasaki |
Preimage Attack on 23-Step Tiger. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Paul Honeine, Cédric Richard |
Preimage Problem in Kernel-Based Machine Learning. |
IEEE Signal Process. Mag. |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Jooyoung Lee 0001, Martijn Stam, John P. Steinberger |
The preimage security of double-block-length compression functions. |
IACR Cryptol. ePrint Arch. |
2011 |
DBLP BibTeX RDF |
|
20 | Elena Andreeva 0001, Bart Mennink |
Provable Chosen-Target-Forced-Midfix Preimage Resistance. |
Selected Areas in Cryptography |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Frederik Armknecht, Ewan Fleischmann, Matthias Krause 0001, Jooyoung Lee 0001, Martijn Stam, John P. Steinberger |
The Preimage Security of Double-Block-Length Compression Functions. |
ASIACRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Yu Sasaki |
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool. |
FSE |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama |
Preimage Attacks on Full-ARIRANG (Poster). |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama |
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward. |
WISA |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Jian Zou, Wenling Wu, Shuang Wu 0004, Bozhan Su, Le Dong |
Preimage Attacks on Step-Reduced SM3 Hash Function. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Elena Andreeva 0001, Martijn Stam |
The Symbiosis between Collision and Preimage Resistance. |
IMACC |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Lei Wang 0031, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama |
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach. |
CT-RSA |
2011 |
DBLP DOI BibTeX RDF |
|
20 | Jooyoung Lee, Je Hong Park |
Preimage resistance of LPmkr with r=m-1. |
Inf. Process. Lett. |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Gaëtan Leurent |
Quantum Preimage and Collision Attacks on CubeHash. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
20 | Takanori Isobe 0001, Taizo Shirai |
Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
20 | Matthias Krause 0001, Frederik Armknecht, Ewan Fleischmann |
Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
20 | Jinmin Zhong, Xuejia Lai |
Improved Preimage Attack on One-block MD4. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
20 | Çagdas Çalik, Meltem Sönmez Turan |
Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
20 | Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang |
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
20 | Pawel Morawiecki, Marian Srebrny |
A SAT-based preimage analysis of reduced KECCAK hash functions. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
20 | Wei-Shi Zheng 0001, Jian-Huang Lai, Pong Chi Yuen |
Penalized preimage learning in kernel principal component analysis. |
IEEE Trans. Neural Networks |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Chiaki Ohtahara, Yu Sasaki, Takeshi Shimoyama |
Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Andreas Noack, Mark Borrmann |
Mutual Preimage Authentication for Fast Handover in Enterprise Networks. |
OTM Conferences (1) |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang |
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. |
ASIACRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Shay Gueron, Michael E. Kounavis |
Mitigating collision and preimage attacks against the generalized MDC-2 mode of operation. |
ISCC |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Çagdas Çalik, Meltem Sönmez Turan |
Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256. |
LATINCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Christian Rechberger |
Second-Preimage Analysis of Reduced SHA-1. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Yu Sasaki, Florian Mendel, Kazumaro Aoki |
Preimage Attacks against PKC98-Hash and HAS-V. |
ICISC |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Kimmo Halunen, Juha Röning |
Preimage Attacks against Variants of Very Smooth Hash. |
IWSEC |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen |
On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. |
CANS |
2010 |
DBLP DOI BibTeX RDF |
|
20 | Yan Gérard, David Coeurjolly, Fabien Feschet |
Gift-wrapping based preimage computation algorithm. |
Pattern Recognit. |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Martine Dexet, Eric Andres |
A generalized preimage for the digital analytical hyperplane recognition. |
Discret. Appl. Math. |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Deukjo Hong, Woo-Hwan Kim, Bonwook Koo |
Preimage Attack on ARIRANG. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
20 | Jinmin Zhong, Xuejia Lai |
Preimage Attacks on Reduced DHA-256. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
20 | Yu Sasaki, Lei Wang 0031, Kazumaro Aoki |
Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
20 | Danilo Gligoroski, Rune Steinsmo Ødegård |
On the Complexity of Khovratovich et.al's Preimage Attack on Edon-R. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
20 | Yu Sasaki |
A 2nd-Preimage Attack on AURORA-512. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
20 | Jooyoung Lee, Je Hong Park |
Adaptive Preimage Resistance and Permutation-based Hash Functions. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
20 | Takeshi Koshiba, Takanori Odaira |
Statistically-Hiding Quantum Bit Commitment from Approximable-Preimage-Size Quantum One-Way Function. |
TCQ |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Shiwei Chen, Chenhui Jin |
A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
20 | Gaëlle Largeteau-Skapin, Eric Andres |
Generalized Preimage of Conics. |
IWCIA Special Track on Applications |
2009 |
DBLP BibTeX RDF |
|
20 | Yongjin Lee, Yunsu Chung, Kiyoung Moon |
Inverse operation and preimage attack on BioHashing. |
CIB |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Deukjo Hong, Bonwook Koo, Yu Sasaki |
Improved Preimage Attack for 68-Step HAS-160. |
ICISC |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Deukjo Hong, Bonwook Koo, Woo-Hwan Kim, Daesung Kwon |
Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash. |
ICISC |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Gaoli Wang, Shaohui Wang |
Preimage Attack on Hash Function RIPEMD. |
ISPEC |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Ming Mao, Shaohui Chen, Jin Xu |
Construction of the Initial Structure for Preimage Attack of MD5. |
CIS (1) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Wen-Chiao Cheng |
On Preimage Entropy of a Sequential Mapping. |
Open Syst. Inf. Dyn. |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Søren S. Thomsen |
An improved preimage attack on MD2. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
20 | Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu |
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
20 | Jean-Philippe Aumasson, Willi Meier, Florian Mendel |
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
20 | Nicolas Thorstensen, Florent Ségonne, Renaud Keriven |
Normalization and preimage problem in gaussian kernel PCA. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Kazumaro Aoki, Yu Sasaki |
Preimage Attacks on One-Block MD4, 63-Step MD5 and More. |
Selected Areas in Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Jean-Philippe Aumasson, Willi Meier, Florian Mendel |
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. |
Selected Areas in Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Charles Bouillaguet, Pierre-Alain Fouque, Adi Shamir, Sébastien Zimmer |
Second Preimage Attacks on Dithered Hash Functions. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
20 | Donghoon Chang |
Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
20 | Lei Duo, Chao Li |
Improved Collision and Preimage Resistance Bounds on PGV Schemes. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
20 | Donghoon Chang |
Preimage Attack on Parallel FFT-Hashing. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
20 | Donghoon Chang |
Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
20 | Donghoon Chang |
Preimage Attack on Hashing with Polynomials proposed at ICISC'06. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
20 | Kameshwar Chandrasekar, Michael S. Hsiao |
Implicit Search-Space Aware Cofactor Expansion: A Novel Preimage Computation Technique. |
ICCD |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Bart Preneel |
Preimage Resistance. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Bart Preneel |
Second preimage resistance. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
20 | David Coeurjolly, Isabelle Sivignon, Florent Dupont, Fabien Feschet, Jean-Marc Chassery |
On digital plane preimage structure. |
Discret. Appl. Math. |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Iftach Haitner, Ronen Shaltiel |
Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions |
Electron. Colloquium Comput. Complex. |
2004 |
DBLP BibTeX RDF |
|
20 | Iftach Haitner, Ronen Shaltiel |
Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
20 | David Coeurjolly, Isabelle Sivignon, Florent Dupont, Fabien Feschet, Jean-Marc Chassery |
Digital plane preimage structure. |
Electron. Notes Discret. Math. |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Kameshwar Chandrasekar, Michael S. Hsiao |
ATPG-based preimage computation: efficient search space pruning with ZBDD. |
HLDVT |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Jouni Järvinen |
Preimage Relations and Their Matrices. |
Rough Sets and Current Trends in Computing |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Rua-Huan Tsaih, Yat-wah Wan |
A Guide for the Upper Bound on the Number of Continuous-Valued Hidden Nodes of a Feed-Forward Network. |
ICANN (1) |
2009 |
DBLP DOI BibTeX RDF |
single-hidden layer feed-forward neural network, parity problem, Bound, preimage, hidden nodes |
19 | Daniel Andres, Viktor Levandovskyy, Jorge Martín-Morales |
Principal intersection and bernstein-sato polynomial of an affine variety. |
ISSAC |
2009 |
DBLP DOI BibTeX RDF |
bernstein-sato polynomial of variety, initial ideal, intersection with subalgebra, non-commutative gr?bner bases, preimage of ideal, annihilator, d-modules |
19 | Kimmo Halunen, Pauli Rikula, Juha Röning |
On the Security of VSH in Password Schemes. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
VSH, hash function, preimage attack, password security |
19 | Akira Numayama, Toshiyuki Isshiki, Keisuke Tanaka |
Security of Digital Signature Schemes in Weakened Random Oracle Models. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
digital signature, collision, random oracle model, preimage |
19 | Viktor Levandovskyy, Jorge Martín-Morales |
Computational D-module theory with singular, comparison with other systems and two new algorithms. |
ISSAC |
2008 |
DBLP DOI BibTeX RDF |
bernstein-sato polynomial, intersection with subalgebra, non-commutative groebner bases, preimage of ideal, annihilator, groebner bases, D-modules |
19 | Jules Desharnais, Bernhard Möller, Georg Struth |
Kleene algebra with domain. |
ACM Trans. Comput. Log. |
2006 |
DBLP DOI BibTeX RDF |
Idempotent semiring, codomain, image and preimage operation, program development and analysis, domain, Kleene algebra, equational reasoning, state transition systems |
13 | Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel |
Reducing Complexity Assumptions for Statistically-Hiding Commitment. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Statistical hiding, Regular one way functions, Bit commitment |
13 | Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel |
Cryptanalysis of Dynamic SHA(2). |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Dynamic SHA, Dynamic SHA2, hash function, collision attack, SHA-3 candidate |
13 | Nurdan Buz Saran, Ali Doganaksoy |
Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Jarkko Kari, Pascal Vanier, Thomas Zeume |
Bounds on Non-surjective Cellular Automata. |
MFCS |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Oguzhan Kara, Adem Atalay |
Preimages of hash functions through rainbow tables. |
ISCIS |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
On the Security of Tandem-DM. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
block cipher based, double-block length, Tandem-DM, Cryptographic hash function, ideal cipher model, proof of security |
13 | Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp Weinmann |
Meet-in-the-Middle Attacks on SHA-3 Candidates. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Mridul Nandi |
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
MD hash function, padding rule, suffix-free, collision resistant |
13 | Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin |
Inside the Hypercube. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Praveen Gauravaram, Lars R. Knudsen |
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Davies-Meyer, RMX, Digital signatures, Hash functions |
13 | Kan Yasuda |
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
birthday bound, MAC, message authentication code, unforgeability, unpredictability, domain extension |
13 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Security of Cyclic Double Block Length Hash Functions. |
IMACC |
2009 |
DBLP DOI BibTeX RDF |
block cipher based, double-block length, Cyclic-DM, Abreast-DM, cryptographic hash function, ideal cipher model, proof of security |
13 | Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic |
Speeding up Collision Search for Byte-Oriented Hash Functions. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Christophe Petit 0001, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor |
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Gaëtan Leurent, Phong Q. Nguyen |
How Risky Is the Random-Oracle Model? |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Analysis of the Hash Function Design Strategy Called SMASH. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|