|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 213 occurrences of 97 keywords
|
|
|
Results
Found 340 publication records. Showing 340 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
179 | Takanori Isobe 0001, Kyoji Shibutani |
Preimage Attacks on Reduced Tiger and SHA-2. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger |
133 | Yu Sasaki, Kazumaro Aoki |
A Preimage Attack for 52-Step HAS-160. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
HAS-160, splice-and-cut, hash function, preimage, one-way, local collision |
132 | Phillip Rogaway, Thomas Shrimpton |
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
preimage resistance, second-preimage resistance, provable security, cryptographic hash functions, collision resistance |
127 | Elena Andreeva 0001, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer |
Second Preimage Attacks on Dithered Hash Functions. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Hash Function, Dithering |
119 | Yu Sasaki, Kazumaro Aoki |
Preimage Attacks on 3, 4, and 5-Pass HAVAL. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
splice-and-cut, hash function, preimage, one-way, meet-in-the-middle, local collision, HAVAL |
119 | Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang 0001 |
The Second-Preimage Attack on MD4. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
collision differential path, weak message, Hash function, second-preimage |
119 | Yu Sasaki |
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
wide pipe, pseudo-preimage, hash, preimage, truncate, meet-in-the-middle, HAVAL |
93 | Florian Mendel, Norbert Pramstaller, Christian Rechberger |
A (Second) Preimage Attack on the GOST Hash Function. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, preimage attack |
93 | Yu Sasaki, Kazumaro Aoki |
Preimage Attacks on Step-Reduced MD5. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Message Expansion, Hash Function, MD5, Preimage Attack, One-Way, Local Collision |
79 | Yu Sasaki, Kazumaro Aoki |
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
RIPEMD, double branch, preimage, meet-in-the-middle |
79 | Gaoli Wang, Shaohui Wang |
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
key-recovery, HMAC, second preimage attack, NMAC, HAVAL |
79 | Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Preimage Attack on the Parallel FFT-Hashing Function. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
the Parallel FFT-Hashing function, Cryptographic Hash Function, Preimage Attack |
73 | Lars R. Knudsen, Florian Mendel, Christian Rechberger, Søren S. Thomsen |
Cryptanalysis of MDC-2. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
MDC-2, hash function, collision, preimage |
66 | Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
Digital Signatures Out of Second-Preimage Resistant Hash Functions. |
PQCrypto |
2008 |
DBLP DOI BibTeX RDF |
second-preimage resistance, provable security, Merkle signatures |
66 | Florian Mendel, Christian Rechberger, Martin Schläffer |
Cryptanalysis of Twister. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Twister, hash function, collision-, preimage attack, SHA-3, second-preimage- |
66 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt |
Cryptanalysis of the GOST Hash Function. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, collision attack, preimage attack, second preimage attack |
60 | Martine Dexet, Eric Andres |
A Generalized Preimage for the Standard and Supercover Digital Hyperplane Recognition. |
DGCI |
2006 |
DBLP DOI BibTeX RDF |
|
60 | Lars R. Knudsen, John Erik Mathiassen |
Preimage and Collision Attacks on MD2. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Yu Sasaki |
Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
DMMD, collision, HMAC, second preimage, AURORA |
60 | Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 |
Preimages for Step-Reduced SHA-2. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256 |
60 | Mario Lamberger, Florian Mendel |
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3 |
60 | Yu Sasaki, Kazumaro Aoki |
Finding Preimages in Full MD5 Faster Than Exhaustive Search. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
splice-and-cut, hash function, MD5, preimage, one-way, local collision |
54 | Masashi Kiyomi, Toshiki Saitoh, Ryuhei Uehara |
Reconstruction of Interval Graphs. |
COCOON |
2009 |
DBLP DOI BibTeX RDF |
the graph reconstruction conjecture, polynomial time algorithm, interval graphs |
54 | Christophe De Cannière, Christian Rechberger |
Preimages for Reduced SHA-0 and SHA-1. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
directed random graph, cryptanalysis, hash function, SHA-1, preimages, SHA-0 |
52 | Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, John Kelsey |
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Herding attack, Trojan message attack, Zipper hash, Concatenated hash, Tree hash, Second preimage attack |
52 | Kota Ideguchi, Dai Watanabe |
Second Preimage Attack on SHAMATA-512. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
SHAMATA, hash function, second preimage attack, SHA-3 candidate |
52 | Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu |
Distinguishing and Second-Preimage Attacks on CBC-Like MACs. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
CBC, MAC, Distinguishing attack, Second preimage attack |
52 | Kazumaro Aoki, Yu Sasaki |
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
SHA-1, preimage, one-way, meet-in-the-middle, SHA-0 |
52 | Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong |
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL |
46 | Chao Li, Qiang Li, San Ling |
Properties and Applications of Preimage Distributions of Perfect Nonlinear Functions. |
IEEE Trans. Inf. Theory |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Yan Gérard, Fabien Feschet, David Coeurjolly |
Gift-Wrapping Based Preimage Computation Algorithm. |
DGCI |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Shuo Sheng, Michael S. Hsiao |
Success-Driven Learning in ATPG for Preimage Computation. |
IEEE Des. Test Comput. |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Bin Li, Michael S. Hsiao, Shuo Sheng |
A Novel SAT All-Solutions Solver for Efficient Preimage Computation. |
DATE |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Shuo Sheng, Michael S. Hsiao |
Efficient Preimage Computation Using A Novel Success-Driven ATPG. |
DATE |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Gaëtan Leurent |
MD4 is Not One-Way. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, preimage, MD4, one-way |
40 | Florian Mendel |
Two Passes of Tiger Are Not One-Way. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Anders Hansson, Gabriel Istrate, Shiva Prasad Kasiviswanathan |
Combinatorics of TCP reordering. |
J. Comb. Optim. |
2006 |
DBLP DOI BibTeX RDF |
|
40 | John Kelsey, Bruce Schneier |
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
39 | |
Quantum preimage, 2nd-preimage, and collision resistance of SHA3. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
39 | Ho Gi Jung |
Support vector number reduction by extending iterative preimage addition using genetic algorithm-based preimage estimation. |
Pattern Recognit. Lett. |
2016 |
DBLP DOI BibTeX RDF |
|
39 | Jian Zou, Wenling Wu, Shuang Wu 0004, Le Dong |
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function. |
J. Inf. Sci. Eng. |
2014 |
DBLP BibTeX RDF |
|
39 | Deukjo Hong, Bonwook Koo, Dong-Chan Kim |
Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2012 |
DBLP DOI BibTeX RDF |
|
39 | Jian Zou, Wenling Wu, Shuang Wu 0004, Le Dong |
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
39 | Phillip Rogaway, Thomas Shrimpton |
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
33 | Rua-Huan Tsaih, Yat-wah Wan, Shin-Ying Huang |
The rule-extraction through the preimage analysis. |
IJCNN |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Martine Dexet, Eric Andres |
Linear Discrete Line Recognition and Reconstruction Based on a Generalized Preimage. |
IWCIA |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Sanparith Marukatat |
Sparse Kernel PCA by Kernel K-Means and Preimage Reconstruction Algorithms. |
PRICAI |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Alexandru Turjan, Bart Kienhuis |
Storage Management in Process Networks using the Lexicographically Maximal Preimage. |
ASAP |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Kan Yasuda |
How to Fill Up Merkle-Damgård Hash Functions. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, second-preimage resistance, one-wayness, hash function, padding |
33 | Norbert Pramstaller, Mario Lamberger, Vincent Rijmen |
Second Preimages for Iterated Hash Functions and Their Implications on MACs. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions |
33 | Donghoon Chang, Kishan Chand Gupta, Mridul Nandi |
RC4-Hash: A New Hash Function Based on RC4. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Hash Function, Collision Attack, RC4, Preimage Attack |
33 | Viktor Levandovskyy |
Intersection of ideals with non-commutative subalgebras. |
ISSAC |
2006 |
DBLP DOI BibTeX RDF |
homomorphism of algebras, intersection with subalgebra, non-commutative algebra, preimage of ideal, restriction, elimination, Groebner bases |
33 | Bernhard Möller, Georg Struth |
Greedy-Like Algorithms in Modal Kleene Algebra. |
RelMiCS |
2003 |
DBLP DOI BibTeX RDF |
Idempotent semiring, image and preimage operation, modal operators, Geach formula, program development and analysis, confluence, Kleene algebra |
27 | Ran Canetti, Ronny Ramzi Dakdouk |
Towards a Theory of Extractable Functions. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Kimmo Halunen, Pauli Rikula, Juha Röning |
Finding Preimages of Multiple Passwords Secured with VSH. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin |
Linearization Framework for Collision Attacks: Application to CubeHash and MD6. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
CubeHash and MD6, Hash functions, collisions, differential attack, SHA-3 |
27 | Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu 0001 |
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
ROX, ESh, Hash Functions, MPP, Domain Extension |
27 | Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton |
Salvaging Merkle-Damgård for Practical Applications. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
HAS-160, differential cryptanalysis, related-key rectangle attack |
27 | Ran Canetti, Ronny Ramzi Dakdouk |
Extractable Perfectly One-Way Functions. |
ICALP (2) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Bin Zhang 0015, Chenhui Jin |
Cryptanalysis of a Chaos-based Stream Cipher. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Donghoon Chang, Mridul Nandi |
Improved Indifferentiability Security Analysis of chopMD Hash Function. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo 0001, San Ling, Huaxiong Wang |
Cryptanalysis of LASH. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Eli Biham |
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Elena Andreeva 0001, Gregory Neven, Bart Preneel, Thomas Shrimpton |
Seven-Property-Preserving Iterated Hashing: ROX. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen |
The Grindahl Hash Functions. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
hash functions, AES, Rijndael, proposal, design strategy |
27 | Sylvain Pasini, Serge Vaudenay |
Hash-and-Sign with Weak Hashing Made Secure. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Second Preimages for SMASH. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
SMASH, cryptanalysis, hash functions, second preimages |
27 | Wei-Shi Zheng 0001, Jian-Huang Lai |
Regularized Locality Preserving Learning of Pre-Image Problem in Kernel Principal Component Analysis. |
ICPR (2) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Iftach Haitner, Omer Horvitz, Jonathan Katz, Chiu-Yuen Koo, Ruggero Morselli, Ronen Shaltiel |
Reducing Complexity Assumptions for Statistically-Hiding Commitment. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Frédéric Muller |
The MD2 Hash Function Is Not One-Way. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002, Soo Hak Sung |
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Jacques Patarin |
Collisions and Inversions for Damgård's Whole Hash Function. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
20 | Seungjun Baek 0002, Giyoon Kim, Jongsung Kim |
Preimage Attacks on Reduced-Round Ascon-Xof. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
20 | Shiyao Chen, Jian Guo 0001, Eik List, Danping Shi, Tianyu Zhang |
Diving Deep into the Preimage Security of AES-like Hashing. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
20 | Shiyao Chen, Jian Guo 0001, Eik List, Danping Shi, Tianyu Zhang |
Diving Deep into the Preimage Security of AES-Like Hashing. |
EUROCRYPT (1) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Xiyue Zhang, Benjie Wang, Marta Kwiatkowska |
Provable Preimage Under-Approximation for Neural Networks. |
TACAS (3) |
2024 |
DBLP DOI BibTeX RDF |
|
20 | Junling Pei, Lusheng Chen |
Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems. |
IET Inf. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Yongseong Lee, Jinkeon Kang, Donghoon Chang, Seokhie Hong |
A preimage attack on reduced GIMLI-HASH with unbalanced squeezing phase. |
IET Inf. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang |
Quantum rotational cryptanalysis for preimage recovery of round-reduced Keccak. |
Quantum Inf. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Xiyue Zhang, Benjie Wang, Marta Kwiatkowska |
On Preimage Approximation for Neural Networks. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Tianyu Zhang |
Comprehensive Preimage Security Evaluations on Rijndael-based Hashing. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
20 | Huina Li, Le He, Shiyao Chen, Jian Guo 0001, Weidong Qiu |
Automatic Preimage Attack Framework on \ascon Using a Linearize-and-Guess Approach. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
20 | Qinggan Fu, Ye Luo, Qianqian Yang 0003, Ling Song 0001 |
Preimage and Collision Attacks on Reduced Ascon Using Algebraic Strategies. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
20 | Xiaoen Lin, Le He, Hongbo Yu |
Practical Preimage Attack on 3-Round Keccak-256. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
20 | |
Improved Preimage Sampling for Lattices. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
20 | Corentin Jeudy, Adeline Roux-Langlois, Olivier Sanders |
Revisiting Preimage Sampling for Lattices. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
20 | Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang |
Allocating rotational cryptanalysis-based preimage attack on 4-round Keccak-224 for quantum setting. |
Quantum Inf. Process. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Congming Wei, Xiaoyang Dong, Willi Meier, Lingyue Qin, Ximing Fu |
Differential-Aided Preimage Attacks On Round-Reduced Keccak. |
Comput. J. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | El Mostafa Kalmoun, Mohamed M. S. Nasser, Matti Vuorinen |
Numerical computation of a preimage domain for an infinite strip with rectilinear slits. |
Adv. Comput. Math. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Huina Li, Le He, Shiyao Chen, Jian Guo 0001, Weidong Qiu |
Automatic Preimage Attack Framework on Ascon Using a Linearize-and-Guess Approach. |
IACR Trans. Symmetric Cryptol. |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Zahra Javar, Bruce M. Kapron |
Preimage Awareness in Linicrypt. |
CSF |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Tianyu Zhang |
Comprehensive Preimage Security Evaluations on Rijndael-Based Hashing. |
ACNS Workshops |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang 0001 |
Meet-in-the-Middle Preimage Attacks on Sponge-Based Hashing. |
EUROCRYPT (4) |
2023 |
DBLP DOI BibTeX RDF |
|
20 | Takaki Asanuma, Takanori Isobe 0001 |
A Proof of Work based on Preimage Problem of Variants of SHA-3 with ASIC Resistance. |
J. Inf. Process. |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Théo Nancy, Vassili Maillet, Johann Barbier |
An Analytical Approach to Compute the Exact Preimage of Feed-Forward Neural Networks. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
20 | Runsong Wang, Xuelian Li, Juntao Gao, Hui Li, Baocang Wang |
Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
20 | Le He, Xiaoen Lin, Hongbo Yu |
Improved Preimage Attacks on Round-Reduced Keccak-384/512 via Restricted Linear Structures. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
20 | Lingyue Qin, Jialiang Hua, Xiaoyang Dong, Hailun Yan, Xiaoyun Wang 0001 |
Meet-in-the-Middle Preimage Attacks on Sponge-based Hashing. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
20 | Charlotte Lefevre, Bart Mennink |
Tight Preimage Resistance of the Sponge Construction. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
Displaying result #1 - #100 of 340 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|