![]() |
CrossRef Text and Data Mining |
Result of CrossRef Text and Data Mining Search is the related articles with entitled article. If you click link1 or link2 you will be able to reach the full text site of selected articles; however, some links do not show the full text immediately at now. If you click CrossRef Text and Data Mining Download icon, you will be able to get whole list of articles from literature included in CrossRef Text and Data Mining. |
Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions |
Journal of Information Processing Systems. 2016;12(2):310-321. Published online 2014 December 31 DOI: https://doi.org/10.3745/JIPS.03.0021 |
New Second-Preimage Attacks on Hash Functions Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others Everywhere Second Preimage Resistant Hash Function (esec) Everywhere Second Preimage Resistant Hash Function (ESEC) New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity Digital Signatures Out of Second-Preimage Resistant Hash Functions Cryptographic Hash Functions Questioning the Criteria for Evaluating Non-cryptographic Hash Functions Cryptographic Hash Functions |
This metadata service is kindly provided by CrossRef from May 29, 2014. Journal of Information Processing Systems has participated in CrossRef Text and Data Mining service since February 27, 2015. |