The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for HAVAL with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1992-2006 (17) 2007-2013 (16) 2015-2023 (12)
Publication types (Num. hits)
article(23) inproceedings(22)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 31 occurrences of 17 keywords

Results
Found 53 publication records. Showing 45 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
243Yu Sasaki, Kazumaro Aoki Preimage Attacks on 3, 4, and 5-Pass HAVAL. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF splice-and-cut, hash function, preimage, one-way, meet-in-the-middle, local collision, HAVAL
189Gaoli Wang, Shaohui Wang Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key-recovery, HMAC, second preimage attack, NMAC, HAVAL
189Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL
173Hongbo Yu, Xiaoyun Wang 0001, Aaram Yun, Sangwoo Park Cryptanalysis of the Full HAVAL with 4 and 5 Passes. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF message modification, Hash function, collision, differential path
140Yu Sasaki Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wide pipe, pseudo-preimage, hash, preimage, truncate, meet-in-the-middle, HAVAL
140Kazuhiro Suzuki, Kaoru Kurosawa How to Find Many Collisions of 3-Pass HAVAL. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash function, collision, differential attack, HAVAL
111Bart Van Rompay, Alex Biryukov, Bart Preneel, Joos Vandewalle Cryptanalysis of 3-Pass HAVAL. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
111Sangwoo Park, Soo Hak Sung, Seongtaek Chee, Jongin Lim 0001 On the Security of Reduced Versions of 3-Pass HAVAL. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
91Hirotaka Yoshida, Alex Biryukov, Christophe De Cannière, Joseph Lano, Bart Preneel Non-randomness of the Full 4 and 5-Pass HAVAL. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
70Hongbo Yu, Xiaoyun Wang 0001 Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-collision, multi-near-collision, Hash function, sufficient condition, differential path
70Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
70Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee 0002 On the Security of Encryption Modes of MD4, MD5 and HAVAL. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Haval Ismael Hussein, Abdulhakeem O. Mohammed, Masoud Muhammed Hassan, Ramadhan J. Mstafa Lightweight deep CNN-based models for early detection of COVID-19 patients from chest X-ray images. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
38Abdulhakeem O. Mohammed, Haval Ismael Hussein, Ramadhan J. Mstafa, Adnan Mohsin Abdulazeez A blind and robust color image watermarking scheme based on DCT and DWT domains. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
38Bryar A. Hassan, Tarik A. Rashid, Aram M. Ahmed, Shko M. Qader, Jaffer Majidpour, Mohmad Hussein Abdalla, Noor Tayfor, Hozan K. Hamarashid, Haval Sidqi, Kaniaw A. Noori Equitable and Fair Performance Evaluation of Whale Optimization Algorithm. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
38Diman Hassan, Haval Ismael Hussein, Masoud Muhammed Hassan Heart disease prediction based on pre-trained deep neural networks combined with principal component analysis. Search on Bibsonomy Biomed. Signal Process. Control. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
38Dindar S. Bari, Mohammed Noor S. Rammoo, Haval Y. Y. Aldosky, Mohammed K. Jaqsi, Ørjan Grøttem Martinsen The Five Basic Human Senses Evoke Electrodermal Activity. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
38Haval Tariq Sadeeq, Adnan Mohsin Abdulazeez Giant Trevally Optimizer (GTO): A Novel Metaheuristic Algorithm for Global Optimization and Challenging Engineering Problems. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
38Haval Ismael Hussein, Hivi Ismat Dino, Ramadhan J. Mstafa, Masoud Muhammed Hassan Person-independent facial expression recognition based on the fusion of HOG descriptor and cuttlefish algorithm. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
38Sang-Woong Lee, Haval Mohammed sidqi, Mokhtar Mohammadi, Shima Rashidi, Amir Masoud Rahmani, Mohammad Masdari, Mehdi Hosseinzadeh 0001 Towards secure intrusion detection systems using deep learning techniques: Comprehensive analysis and review. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
38Ramadhan J. Mstafa, Younis Mohammed Younis, Haval Ismael Hussein, Muhsin Atto A New Video Steganography Scheme Based on Shi-Tomasi Corner Detector. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
38Haval Sadeq Using total probability in image template matching. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
38Haval D. Abdalkarim, Halgurd S. Maghdid Fusing Multi-Sensor Measurements to Improve Heading Estimation using Kalman Gain for Indoors Smartphone Positioning Solutions. Search on Bibsonomy ICFSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
38Nikhilesh Haval Three-Dimensional Documentation of Complex Heritage Structures. Search on Bibsonomy IEEE Multim. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29Jian Guo 0001, Chunhua Su, Wun-She Yap An improved preimage attack against HAVAL-3. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
29Yu Sasaki Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL Compression Function. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
29Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang 0031, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
29WenYing Zhang, Yanyan Li, Lei Wu A new one-bit difference collision attack on HAVAL-128. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
29Yu Sasaki Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
29Hongbo Yu, Xiaoyun Wang 0001 Full Key-Recovery Attack on the HMAC/NMAC Based on 3 and 4-Pass HAVAL. Search on Bibsonomy ISPEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Jean-Philippe Aumasson, Willi Meier, Florian Mendel Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
29Jean-Philippe Aumasson, Willi Meier, Florian Mendel Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Pairat Thorncharoensri, Tianbing Xia, Yi Mu 0001 How to Find the Sufficient Collision Conditions for Haval-128 Pass 3 by Backward Analysis. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2007 DBLP  BibTeX  RDF
29Kazuhiro Suzuki, Kaoru Kurosawa How To Find Many Collisions of 3-Pass HAVAL. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
29Hongbo Yu, Xiaoyun Wang 0001 MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
29Zhang-yi Wang, Huanguo Zhang, Zhongping Qin, Qingshu Meng Cryptanalysis of 4-Pass HAVAL. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
29Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
29Xiaoyun Wang 0001, Dengguo Feng, Xiuyuan Yu An attack on hash function HAVAL-128. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Jongsung Kim, Alex Biryukov, Bart Preneel, Sangjin Lee 0002 On the Security of Encryption Modes of MD4, MD5 and HAVAL. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
29Xiaoyun Wang 0001, Dengguo Feng, Xuejia Lai, Hongbo Yu Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
29Yuliang Zheng 0001, Josef Pieprzyk, Jennifer Seberry HAVAL - A One-Way Hashing Algorithm with Variable Length of Output. Search on Bibsonomy AUSCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
21Xiaoyun Wang 0001, Hongbo Yu How to Break MD5 and Other Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Xiaoyun Wang 0001, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu Cryptanalysis of the Hash Functions MD4 and RIPEMD. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Nan Kyoung Park, Joon Ho Hwang, Pil Joong Lee HAS-V: A New Hash Function with Variable Output Length. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Sang-Uk Shin, Kyung Hyune Rhee, DaeHyun Ryu, Sangjin Lee A New Hash Function Based on MDx-Family and Its Application to MAC. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #45 of 45 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license