Search

Your search keyword '"Collision attack"' showing total 282 results

Search Constraints

Start Over You searched for: Descriptor "Collision attack" Remove constraint Descriptor: "Collision attack" Topic hash chain Remove constraint Topic: hash chain
282 results on '"Collision attack"'

Search Results

1. HDL Design and Verification of Hash Based Authentication Algorithms

2. A Novel Approach to Increase Security in AODV Using RSA Asymmetric Cryptography and Hash Function

3. A Parallel Hash Function with Variable Initial Values

4. Security Analysis of a Certificateless Signature from Lattices

5. A provably secure non-iterative hash function resisting birthday attack

6. Research on the Hash Function Structures and its Application

7. Cryptanalysis of the LSH hash functions

8. Impact of hash value truncation on ID anonymity in Wireless Sensor Networks

9. A novel keyed parallel hashing scheme based on a new chaotic system

10. Collision analysis and improvement of a hash function based on chaotic tent map

11. A Preimage Attack on the MJH Hash Function

12. TDHA: A Timestamp Defined Hash Algorithm for Secure Data Dissemination in VANET

13. A New Scheme of Blockcipher Hash

14. The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols

15. Watch your constants: malicious Streebog

16. Group Key Generation and Exchange Scheme using a Trapdoor Collision Hash in M2M Communications Environment

17. Cryptanalysis of Full RIPEMD-128

18. A Review on Cryptographic Hashing Algorithms for Message Authentication

19. Cryptanalysis of the HaF family of hash functions

20. An improved preimage attack against HAVAL-3

21. Design of Hash Algorithm Using Latin Square

22. Application of Improved Hash Function in the Message Authentication and Message Integrity

23. How to Hash a Set

24. Better Than Advertised

25. Finding hash collisions using MPI on HPC clusters

26. A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps

27. Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward Operations

28. Attacks on a double length blockcipher-based hash proposal

29. Design of Lightweight Hash Function Based on Iterate

30. Building a 256-bit hash function on a stronger MD variant

31. RFID Secure Protocol Based on Time-Based Hash Chain

32. Collision Attack on Grindahl

33. Randomness testing of non-cryptographic hash functions for real-time hash table based storage and look-up of URLs

34. An IP Traceback Protocol using a Compressed Hash Table, a Sinkhole Router and Data Mining based on Network Forensics against Network Attacks

35. LOCHA: A Light-weight One-way Cryptographic Hash Algorithm for Wireless Sensor Network

36. Vehicle Intruder Alert System using Multi-Layered Authentication Technique

37. PinTar

38. Inside SHA-3

39. On the relationships between perfect nonlinear functions and universal hash families

40. Second order collision for the 42-step reduced DHA-256 hash function

41. Secured Hash2 based Message Authentication Code using GUI Controls

42. Preimage and pseudo-collision attacks on step-reduced SM3 hash function

43. A Keyed Hash Function

44. Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings

45. Chaotic hash function based plain-image dependent block ciphering technique

46. Improvement of hash function Edon-R on collision resistance

47. Key exposure free chameleon hash schemes based on discrete logarithm problem

48. A Study on Area-Efficient Design of Unified MD5 and HAS-160 Hash Algorithms

49. Double-A -- A Salsa20 Like: The Security

50. Security Analysis of Randomize-Hash-then-Sign Digital Signatures

Catalog

Books, media, physical & digital resources