The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for preimage with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2003 (15) 2004-2005 (19) 2006 (28) 2007-2008 (50) 2009 (56) 2010 (18) 2011 (15) 2012 (22) 2013-2014 (24) 2015-2016 (15) 2017-2018 (16) 2019-2020 (20) 2021-2022 (21) 2023 (17) 2024 (4)
Publication types (Num. hits)
article(144) incollection(5) inproceedings(191)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 213 occurrences of 97 keywords

Results
Found 340 publication records. Showing 340 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Jinmin Zhong, Xuejia Lai Improved preimage attack on one-block MD4. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Gaëlle Largeteau-Skapin, Rita Zrour, Eric Andres, Akihiro Sugimoto, Yukiko Kenmochi Optimal consensus set and preimage of 4-connected circles in a noisy environment. Search on Bibsonomy ICPR The full citation details ... 2012 DBLP  BibTeX  RDF
20Yu Sasaki, Lei Wang 0031, Shuang Wu 0004, Wenling Wu Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Dmitry Khovratovich Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings. Search on Bibsonomy ASIACRYPT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Ji Li, Takanori Isobe 0001, Kyoji Shibutani Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Shuang Wu 0004, Dengguo Feng, Wenling Wu, Jian Guo 0001, Le Dong, Jian Zou (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Simon Knellwolf, Dmitry Khovratovich New Preimage Attacks against Reduced SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
20Bart Preneel Second Preimage Resistance. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Bart Preneel Preimage Resistance. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20 Everywhere Second Preimage Resistant Hash Function (esec). Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Jinmin Zhong, Xuejia Lai Preimage Attack on Reduced DHA-256. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2011 DBLP  BibTeX  RDF
20Lei Wang 0031, Yu Sasaki Preimage Attack on 23-Step Tiger. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Paul Honeine, Cédric Richard Preimage Problem in Kernel-Based Machine Learning. Search on Bibsonomy IEEE Signal Process. Mag. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Jooyoung Lee 0001, Martijn Stam, John P. Steinberger The preimage security of double-block-length compression functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
20Elena Andreeva 0001, Bart Mennink Provable Chosen-Target-Forced-Midfix Preimage Resistance. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Frederik Armknecht, Ewan Fleischmann, Matthias Krause 0001, Jooyoung Lee 0001, Martijn Stam, John P. Steinberger The Preimage Security of Double-Block-Length Compression Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Yu Sasaki Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama Preimage Attacks on Full-ARIRANG (Poster). Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward. Search on Bibsonomy WISA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Jian Zou, Wenling Wu, Shuang Wu 0004, Bozhan Su, Le Dong Preimage Attacks on Step-Reduced SM3 Hash Function. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Elena Andreeva 0001, Martijn Stam The Symbiosis between Collision and Preimage Resistance. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Lei Wang 0031, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach. Search on Bibsonomy CT-RSA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
20Jooyoung Lee, Je Hong Park Preimage resistance of LPmkr with r=m-1. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Gaëtan Leurent Quantum Preimage and Collision Attacks on CubeHash. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
20Takanori Isobe 0001, Taizo Shirai Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
20Matthias Krause 0001, Frederik Armknecht, Ewan Fleischmann Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
20Jinmin Zhong, Xuejia Lai Improved Preimage Attack on One-block MD4. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
20Çagdas Çalik, Meltem Sönmez Turan Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
20Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
20Pawel Morawiecki, Marian Srebrny A SAT-based preimage analysis of reduced KECCAK hash functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
20Wei-Shi Zheng 0001, Jian-Huang Lai, Pong Chi Yuen Penalized preimage learning in kernel principal component analysis. Search on Bibsonomy IEEE Trans. Neural Networks The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Chiaki Ohtahara, Yu Sasaki, Takeshi Shimoyama Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Andreas Noack, Mark Borrmann Mutual Preimage Authentication for Fast Handover in Enterprise Networks. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Shay Gueron, Michael E. Kounavis Mitigating collision and preimage attacks against the generalized MDC-2 mode of operation. Search on Bibsonomy ISCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Çagdas Çalik, Meltem Sönmez Turan Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256. Search on Bibsonomy LATINCRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Christian Rechberger Second-Preimage Analysis of Reduced SHA-1. Search on Bibsonomy ACISP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Yu Sasaki, Florian Mendel, Kazumaro Aoki Preimage Attacks against PKC98-Hash and HAS-V. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Kimmo Halunen, Juha Röning Preimage Attacks against Variants of Very Smooth Hash. Search on Bibsonomy IWSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Nasour Bagheri, Praveen Gauravaram, Majid Naderi, Søren S. Thomsen On the Collision and Preimage Resistance of Certain Two-Call Hash Functions. Search on Bibsonomy CANS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
20Yan Gérard, David Coeurjolly, Fabien Feschet Gift-wrapping based preimage computation algorithm. Search on Bibsonomy Pattern Recognit. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Martine Dexet, Eric Andres A generalized preimage for the digital analytical hyperplane recognition. Search on Bibsonomy Discret. Appl. Math. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Deukjo Hong, Woo-Hwan Kim, Bonwook Koo Preimage Attack on ARIRANG. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
20Jinmin Zhong, Xuejia Lai Preimage Attacks on Reduced DHA-256. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
20Yu Sasaki, Lei Wang 0031, Kazumaro Aoki Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
20Danilo Gligoroski, Rune Steinsmo Ødegård On the Complexity of Khovratovich et.al's Preimage Attack on Edon-R. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
20Yu Sasaki A 2nd-Preimage Attack on AURORA-512. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
20Jooyoung Lee, Je Hong Park Adaptive Preimage Resistance and Permutation-based Hash Functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
20Takeshi Koshiba, Takanori Odaira Statistically-Hiding Quantum Bit Commitment from Approximable-Preimage-Size Quantum One-Way Function. Search on Bibsonomy TCQ The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Shiwei Chen, Chenhui Jin A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions. Search on Bibsonomy SECRYPT The full citation details ... 2009 DBLP  BibTeX  RDF
20Gaëlle Largeteau-Skapin, Eric Andres Generalized Preimage of Conics. Search on Bibsonomy IWCIA Special Track on Applications The full citation details ... 2009 DBLP  BibTeX  RDF
20Yongjin Lee, Yunsu Chung, Kiyoung Moon Inverse operation and preimage attack on BioHashing. Search on Bibsonomy CIB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Deukjo Hong, Bonwook Koo, Yu Sasaki Improved Preimage Attack for 68-Step HAS-160. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Deukjo Hong, Bonwook Koo, Woo-Hwan Kim, Daesung Kwon Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Gaoli Wang, Shaohui Wang Preimage Attack on Hash Function RIPEMD. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Ming Mao, Shaohui Chen, Jin Xu Construction of the Initial Structure for Preimage Attack of MD5. Search on Bibsonomy CIS (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Wen-Chiao Cheng On Preimage Entropy of a Sequential Mapping. Search on Bibsonomy Open Syst. Inf. Dyn. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Søren S. Thomsen An improved preimage attack on MD2. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
20Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
20Jean-Philippe Aumasson, Willi Meier, Florian Mendel Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
20Nicolas Thorstensen, Florent Ségonne, Renaud Keriven Normalization and preimage problem in gaussian kernel PCA. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Kazumaro Aoki, Yu Sasaki Preimage Attacks on One-Block MD4, 63-Step MD5 and More. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Jean-Philippe Aumasson, Willi Meier, Florian Mendel Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Charles Bouillaguet, Pierre-Alain Fouque, Adi Shamir, Sébastien Zimmer Second Preimage Attacks on Dithered Hash Functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
20Donghoon Chang Preimage Attacks on CellHash, SubHash and Strengthened Versions of CellHash and SubHash. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
20Lei Duo, Chao Li Improved Collision and Preimage Resistance Bounds on PGV Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
20Donghoon Chang Preimage Attack on Parallel FFT-Hashing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
20Donghoon Chang Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
20Donghoon Chang Preimage Attack on Hashing with Polynomials proposed at ICISC'06. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
20Kameshwar Chandrasekar, Michael S. Hsiao Implicit Search-Space Aware Cofactor Expansion: A Novel Preimage Computation Technique. Search on Bibsonomy ICCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Bart Preneel Preimage Resistance. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Bart Preneel Second preimage resistance. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20David Coeurjolly, Isabelle Sivignon, Florent Dupont, Fabien Feschet, Jean-Marc Chassery On digital plane preimage structure. Search on Bibsonomy Discret. Appl. Math. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Iftach Haitner, Ronen Shaltiel Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions Search on Bibsonomy Electron. Colloquium Comput. Complex. The full citation details ... 2004 DBLP  BibTeX  RDF
20Iftach Haitner, Ronen Shaltiel Statistical Zero-Knowledge Arguments for NP Using Approximable-Preimage-Size One-Way Functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
20David Coeurjolly, Isabelle Sivignon, Florent Dupont, Fabien Feschet, Jean-Marc Chassery Digital plane preimage structure. Search on Bibsonomy Electron. Notes Discret. Math. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Kameshwar Chandrasekar, Michael S. Hsiao ATPG-based preimage computation: efficient search space pruning with ZBDD. Search on Bibsonomy HLDVT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Jouni Järvinen Preimage Relations and Their Matrices. Search on Bibsonomy Rough Sets and Current Trends in Computing The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Rua-Huan Tsaih, Yat-wah Wan A Guide for the Upper Bound on the Number of Continuous-Valued Hidden Nodes of a Feed-Forward Network. Search on Bibsonomy ICANN (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF single-hidden layer feed-forward neural network, parity problem, Bound, preimage, hidden nodes
19Daniel Andres, Viktor Levandovskyy, Jorge Martín-Morales Principal intersection and bernstein-sato polynomial of an affine variety. Search on Bibsonomy ISSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bernstein-sato polynomial of variety, initial ideal, intersection with subalgebra, non-commutative gr?bner bases, preimage of ideal, annihilator, d-modules
19Kimmo Halunen, Pauli Rikula, Juha Röning On the Security of VSH in Password Schemes. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VSH, hash function, preimage attack, password security
19Akira Numayama, Toshiyuki Isshiki, Keisuke Tanaka Security of Digital Signature Schemes in Weakened Random Oracle Models. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digital signature, collision, random oracle model, preimage
19Viktor Levandovskyy, Jorge Martín-Morales Computational D-module theory with singular, comparison with other systems and two new algorithms. Search on Bibsonomy ISSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bernstein-sato polynomial, intersection with subalgebra, non-commutative groebner bases, preimage of ideal, annihilator, groebner bases, D-modules
19Jules Desharnais, Bernhard Möller, Georg Struth Kleene algebra with domain. Search on Bibsonomy ACM Trans. Comput. Log. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Idempotent semiring, codomain, image and preimage operation, program development and analysis, domain, Kleene algebra, equational reasoning, state transition systems
13Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel Reducing Complexity Assumptions for Statistically-Hiding Commitment. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Statistical hiding, Regular one way functions, Bit commitment
13Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel Cryptanalysis of Dynamic SHA(2). Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dynamic SHA, Dynamic SHA2, hash function, collision attack, SHA-3 candidate
13Nurdan Buz Saran, Ali Doganaksoy Choosing Parameters to Achieve a Higher Success Rate for Hellman Time Memory Trade Off Attack. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Jarkko Kari, Pascal Vanier, Thomas Zeume Bounds on Non-surjective Cellular Automata. Search on Bibsonomy MFCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Oguzhan Kara, Adem Atalay Preimages of hash functions through rainbow tables. Search on Bibsonomy ISCIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Ewan Fleischmann, Michael Gorski, Stefan Lucks On the Security of Tandem-DM. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher based, double-block length, Tandem-DM, Cryptographic hash function, ideal cipher model, proof of security
13Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp Weinmann Meet-in-the-Middle Attacks on SHA-3 Candidates. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Mridul Nandi Characterizing Padding Rules of MD Hash Functions Preserving Collision Security. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MD hash function, padding rule, suffix-free, collision resistant
13Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin Inside the Hypercube. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Praveen Gauravaram, Lars R. Knudsen On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Davies-Meyer, RMX, Digital signatures, Hash functions
13Kan Yasuda A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF birthday bound, MAC, message authentication code, unforgeability, unpredictability, domain extension
13Ewan Fleischmann, Michael Gorski, Stefan Lucks Security of Cyclic Double Block Length Hash Functions. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher based, double-block length, Cyclic-DM, Abreast-DM, cryptographic hash function, ideal cipher model, proof of security
13Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic Speeding up Collision Search for Byte-Oriented Hash Functions. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Christophe Petit 0001, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Gaëtan Leurent, Phong Q. Nguyen How Risky Is the Random-Oracle Model? Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Analysis of the Hash Function Design Strategy Called SMASH. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 340 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license