CrossRef Text and Data Mining
Result of CrossRef Text and Data Mining Search is the related articles with entitled article. If you click link1 or link2 you will be able to reach the full text site of selected articles; however, some links do not show the full text immediately at now. If you click CrossRef Text and Data Mining Download icon, you will be able to get whole list of articles from literature included in CrossRef Text and Data Mining.
Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Journal of Information Processing Systems. 2016;12(2):310-321.   Published online 2014 December 31    DOI: https://doi.org/10.3745/JIPS.03.0021

Excel Download

New Second-Preimage Attacks on Hash Functions
Journal of Cryptology. 2015;29(4):657-696   
Link1 Link2 Link3 Link4

Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
IET Information Security. 2022;17(3):394-406   
Link1 Link2 Link3

Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
Information Security and Privacy. 2009;214-231   
Link1

Everywhere Second Preimage Resistant Hash Function (esec)
Encyclopedia of Cryptography and Security. 2011;430-430   
Link1

Everywhere Second Preimage Resistant Hash Function (ESEC)
Encyclopedia of Cryptography, Security and Privacy. 2025;835-835   
Link1

New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity
Selected Areas in Cryptography – SAC 2016. 2017;247-263   
Link1

Digital Signatures Out of Second-Preimage Resistant Hash Functions
Post-Quantum Cryptography. 2008;109-123   
Link1

Cryptographic Hash Functions
Practical Blockchains and Cryptocurrencies. 2020;37-45   
Link1

Questioning the Criteria for Evaluating Non-cryptographic Hash Functions
Queue. 2024;22(4):54-72   
Link1 Link2

Cryptographic Hash Functions
Encyclopedia of Database Systems. 2009;538-538   
Link1

This metadata service is kindly provided by CrossRef from May 29, 2014. Journal of Information Processing Systems has participated in CrossRef Text and Data Mining service since February 27, 2015.