Search

Your search keyword '"Collision attack"' showing total 302 results

Search Constraints

Start Over You searched for: Descriptor "Collision attack" Remove constraint Descriptor: "Collision attack" Topic collision resistance Remove constraint Topic: collision resistance
302 results on '"Collision attack"'

Search Results

1. A Parallel Hash Function with Variable Initial Values

2. Collision Attack on 4 Secure PGV Hash Function Schemes based on 4-Round PRESENT-80 with Iterative Differential Approach

3. A provably secure non-iterative hash function resisting birthday attack

4. Research on the Hash Function Structures and its Application

5. Cryptanalysis of the LSH hash functions

6. Impact of hash value truncation on ID anonymity in Wireless Sensor Networks

7. A novel keyed parallel hashing scheme based on a new chaotic system

8. Collision analysis and improvement of a hash function based on chaotic tent map

9. A Preimage Attack on the MJH Hash Function

10. TDHA: A Timestamp Defined Hash Algorithm for Secure Data Dissemination in VANET

11. A New Scheme of Blockcipher Hash

12. Improved cryptanalysis on RIPEMD‐128

13. Watch your constants: malicious Streebog

14. Cryptanalysis of Full RIPEMD-128

15. A Review on Cryptographic Hashing Algorithms for Message Authentication

16. Cryptanalysis of the HaF family of hash functions

17. An improved preimage attack against HAVAL-3

18. Design of Hash Algorithm Using Latin Square

19. Better Than Advertised

20. Finding hash collisions using MPI on HPC clusters

21. Finding partial hash collisions by brute force parallel programming

22. A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps

23. Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward Operations

24. Cryptanalysis of Simpira v1

25. Attacks on a double length blockcipher-based hash proposal

26. Design of Lightweight Hash Function Based on Iterate

27. Building a 256-bit hash function on a stronger MD variant

28. Cryptanalysis of SHA-0 and Reduced SHA-1

29. Collision Attack on Grindahl

30. Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs

31. Cryptanalysis of Double-Block-Length Hash Modes MDC-4 and MJH

32. LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network

33. PinTar

34. The Rebound Attack and Subspace Distinguishers: Application to Whirlpool

35. On the relationships between perfect nonlinear functions and universal hash families

36. New multivariate hash function quadratic polynomials multiplying linear polynomials

37. Second order collision for the 42-step reduced DHA-256 hash function

38. Secured Hash2 based Message Authentication Code using GUI Controls

39. An improvement of chaos-based hash function in cryptanalysis approach: An experience with chaotic neural networks and semi-collision attack

40. On the collision and preimage security of MDC-4 in the ideal cipher model

41. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD

42. A Keyed Hash Function

43. Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings

44. A proposal for high rate double-block-length hash functions

45. Chaotic hash function based plain-image dependent block ciphering technique

46. Parallel algorithm to find collision in Merkle-Damgard construction with fixed point for 2n/2/k work

47. Improvement of hash function Edon-R on collision resistance

48. Efficient Parallelizable Hashing Using Small Non-Compressing Primitives

49. Denying collision in the second round of Keccak Hash Function by camouflaging free bits

50. New Attacks on the Concatenation and XOR Hash Combiners

Catalog

Books, media, physical & digital resources