共 50 条
- [21] Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance FAST SOFTWARE ENCRYPTION, 2004, 3017 : 371 - 388
- [22] New Second Preimage Attack Variants against the MD-Structure CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 98 - +
- [23] Security Evaluation of LIGHTMAC: Second Preimage Attack using Existential Forgery 2020 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, ADVANCED MECHANICAL AND ELECTRICAL ENGINEERING (ICITAMEE 2020), 2020, : 265 - 269
- [24] Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 404 - 427
- [25] Digital Signatures Out of Second-Preimage Resistant Hash Functions POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2008, 5299 : 109 - +
- [26] Distinguishing and Second-Preimage Attacks on CBC-Like MACs CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2009, 5888 : 349 - +
- [27] The Rule-Extraction through the Preimage Analysis 2008 IEEE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-8, 2008, : 1488 - 1494
- [28] Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgard SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 393 - +
- [29] A SECOND PREIMAGE ATTACK ON THE MERKLE-DAMGARD SCHEME WITH A PERMUTATION FOR HASH FUNCTIONS SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 245 - 248