共 50 条
- [1] Characterizing Collision and Second-Preimage Resistance in Linicrypt THEORY OF CRYPTOGRAPHY, TCC 2019, PT I, 2019, 11891 : 451 - 470
- [2] Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 404 - 427
- [3] Provable Preimage Under-Approximation for Neural Networks TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, PT III, TACAS 2024, 2024, 14572 : 3 - 23
- [4] Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance FAST SOFTWARE ENCRYPTION, 2004, 3017 : 371 - 388
- [5] Second Preimage Analysis of Whirlwind INFORMATION SECURITY AND CRYPTOLOGY (INSCRYPT 2014), 2015, 8957 : 311 - 328
- [6] The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 195 - 211
- [7] Decisional Second-Preimage Resistance: When Does SPR Imply PRE? ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT III, 2019, 11923 : 33 - 62
- [9] Second preimage attacks on dithered hash functions ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 270 - +
- [10] Second Preimage Attack on SHAMATA-512 PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 169 - 181