|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 33 occurrences of 18 keywords
|
|
|
Results
Found 50 publication records. Showing 46 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
120 | Kazumaro Aoki, Yu Sasaki |
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
SHA-1, preimage, one-way, meet-in-the-middle, SHA-0 |
97 | Christophe De Cannière, Christian Rechberger |
Preimages for Reduced SHA-0 and SHA-1. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
directed random graph, cryptanalysis, hash function, SHA-1, preimages, SHA-0 |
89 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract). |
SCN |
2006 |
DBLP DOI BibTeX RDF |
|
81 | Stéphane Manuel, Thomas Peyrin |
Collisions on SHA-0 in One Hour. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
hash functions, SHA-0, boomerang attack |
81 | Xiaoyun Wang 0001, Hongbo Yu, Yiqun Lisa Yin |
Efficient Collision Search Attacks on SHA-0. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
Collision search attacks, Hash functions, SHA-1, SHA-0 |
78 | Eli Biham, Rafi Chen, Antoine Joux, Patrick Carribault, Christophe Lemuet, William Jalby |
Collisions of SHA-0 and Reduced SHA-1. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
76 | Xiaoyun Wang 0001, Yiqun Lisa Yin, Hongbo Yu |
Finding Collisions in the Full SHA-1. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
collision search attacks, Hash functions, SHA-1, SHA-0 |
73 | Roshni Chatterjee, Moiz A. Saifee, Dipanwita Roy Chowdhury |
Modifications of SHA-0 to Prevent Attacks. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Eli Biham, Rafi Chen |
Near-Collisions of SHA-0. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
68 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Attacking Reduced Round SHA-256. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
62 | Florent Chabaud, Antoine Joux |
Differential Collisions in SHA-0. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
|
50 | Yusuke Naito 0001, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta |
Improved Collision Search for SHA-0. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Helena Handschuh |
SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm). |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
45 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Impact of Rotations in SHA-1 and Related Hash Functions. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Donghoon Chang, Kishan Chand Gupta, Mridul Nandi |
RC4-Hash: A New Hash Function Based on RC4. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Hash Function, Collision Attack, RC4, Preimage Attack |
34 | Lars R. Knudsen |
SMASH - A Cryptographic Hash Function. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Eli Biham, Rafi Chen, Antoine Joux |
Cryptanalysis of SHA-0 and Reduced SHA-1. |
J. Cryptol. |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Tim Polk, Lily Chen, Sean Turner, Paul E. Hoffman |
Security Considerations for the SHA-0 and SHA-1 Message-Digest Algorithms. |
RFC |
2011 |
DBLP DOI BibTeX RDF |
|
33 | Jongsung Kim, Alex Biryukov, Bart Preneel, Seokhie Hong |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
33 | Praveen Gauravaram, William Millan, Juanma González Nieto |
Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
23 | Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen |
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path |
23 | Antoine Joux, Thomas Peyrin |
Hash Functions and the (Amplified) Boomerang Attack. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
hash functions, SHA-1, boomerang attack |
23 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan |
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Merkle-Damgård construction, MBCA, 3C, 3C+ |
23 | Yu Sasaki, Yusuke Naito 0001, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta |
How to Construct Sufficient Conditions for Hash Functions. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Shuang Wu 0004, Dengguo Feng, Wenling Wu |
New Disturbance Vector for SHA-0 Collision. |
J. Inf. Sci. Eng. |
2010 |
DBLP BibTeX RDF |
|
16 | Yusuke Naito 0001, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta |
Message Modification for Step 21-23 on SHA-0. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
16 | Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida |
Complexity of Differential Attacks on SHA-0 with Various Message Schedules. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida |
Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
16 | Eli Biham, Rafi Chen |
Near-Collisions of SHA-0. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
11 | Ahto Buldas, Sven Laur |
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes? |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shang Gao 0010, Shijie Pan, Yuguang Yang 0001 |
Quantum algorithm for kernelized correlation filter. |
Sci. China Inf. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Shang Gao 0010, Shijie Pan, Guang-Bao Xu, Yu-Guang Yang 0001 |
Quantum average neighborhood margin maximization for feature extraction. |
Quantum Inf. Process. |
2023 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Guang Yang 0001, Hong-Mei Fu, Shang Gao 0010, Yi-Hua Zhou 0001, Wei-Min Shi |
Intrusion detection: A model based on the improved vision transformer. |
Trans. Emerg. Telecommun. Technol. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Guang Yang 0001, Guo-Dong Cao, Rui-Chen Huang, Shang Gao 0010, Yi-Hua Zhou 0001, Wei-Min Shi, Guang-Bao Xu |
Multiparty anonymous quantum communication without multipartite entanglement. |
Quantum Inf. Process. |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Manik Gupta, Bhisham Sharma, Akarsh Tripathi, Shashank Singh 0010, Abhishek Bhola, Rajani Singh, Ashutosh Dhar Dwivedi |
n-Player Stochastic Duel Game Model with Applied Deep Learning and Its Modern Implications. |
Sensors |
2022 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Guang Yang 0001, Xiao-Xiao Liu, Shang Gao 0010, Yihua Zhou 0001, Wei-Min Shi, Jian Li 0035, Dan Li 0018 |
Detector-device-independent quantum secret sharing based on hyper-encoding and single-photon Bell-state measurement. |
Quantum Eng. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Guang Yang 0001, Xiao-Xiao Liu, Shang Gao 0010, Xiu-Bo Chen, Dan Li 0018, Yi-Hua Zhou 0001, Wei-Min Shi |
A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing. |
Quantum Inf. Process. |
2021 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Guang Yang 0001, Shang Gao 0010, Dan Li 0018, Yi-Hua Zhou 0001, Wei-Min Shi |
Three-party quantum secret sharing against collective noise. |
Quantum Inf. Process. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Guang Yang 0001, Shang Gao 0010, Dan Li 0018, Yi-Hua Zhou 0001, Wei-Min Shi |
Two-party quantum key agreement over a collective noisy channel. |
Quantum Inf. Process. |
2019 |
DBLP DOI BibTeX RDF |
|
1 | Shaohua Wang 0010 |
Intensive evaluation and development strategies of tourist attractions' land utilization - A case study of Gulou District in the City of Kaifeng. |
Geoinformatics |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Shaohua Wang 0010 |
The evaluation and research on Chinese ancient passes as tourist resources - A case study of the ancient passes in Shanxi Province. |
Geoinformatics |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Judee K. Burgoon, Douglas P. Twitchell, Matthew L. Jensen, Thomas O. Meservy, Mark Adkins, John Kruse, Amit V. Deokar, Gabriel Tsechpenakis, Shan Lu 0010, Dimitris N. Metaxas, Jay F. Nunamaker Jr., Robert Younger |
Detecting Concealment of Intent in Transportation Screening: A Proof of Concept. |
IEEE Trans. Intell. Transp. Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shan Lu 0010, Gabriel Tsechpenakis, Dimitris N. Metaxas, Matthew L. Jensen, John Kruse |
Blob Analysis of the Head and Hands: A Method for Deception Detection. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Judee K. Burgoon, Mark Adkins, John Kruse, Matthew L. Jensen, Thomas O. Meservy, Douglas P. Twitchell, Amit V. Deokar, Jay F. Nunamaker Jr., Shan Lu 0010, Gabriel Tsechpenakis, Dimitris N. Metaxas, Robert Younger |
An Approach for Intent Identification by Building on Deception Detection. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Shan Lu 0010, Dimitris N. Metaxas, Dimitris Samaras, John Oliensis |
Using Multiple Cues for Hand Tracking and Model Refinement. |
CVPR (2) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #46 of 46 (100 per page; Change: )
|
|