共 50 条
- [1] Second preimage attacks on dithered hash functions ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 270 - +
- [2] Preimage Attacks against Variants of Very Smooth Hash ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2010, 6434 : 251 - 266
- [4] Collision and second preimage attacks on the HTBC hash function Ma, Bingke, 1600, Science Press (51):
- [6] Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 404 - 427
- [7] Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash INFORMATION SECURITY AND CRYPTOLOGY - ISISC 2009, 2010, 5984 : 315 - 331
- [9] Preimage Attacks against PKC98-Hash and HAS-V INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 68 - +
- [10] Attacks on and advances in secure hash algorithms Kishore, Neha (nehakishore.garg@gmail.com), 1600, International Association of Engineers (43):