CrossRef Text and Data Mining
Result of CrossRef Text and Data Mining Search is the related articles with entitled article. If you click link1 or link2 you will be able to reach the full text site of selected articles; however, some links do not show the full text immediately at now. If you click CrossRef Text and Data Mining Download icon, you will be able to get whole list of articles from literature included in CrossRef Text and Data Mining.
Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions
Journal of Information Processing Systems. 2016;12(2):310-321.   Published online 2014 December 31    DOI:

Excel Download

New Second-Preimage Attacks on Hash Functions
Journal of Cryptology. 2015;29(4):657-696   
Link1 Link2 Link3 Link4

Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
Lecture Notes in Computer Science. 2009;214-231   

Everywhere Second Preimage Resistant Hash Function (esec)
Encyclopedia of Cryptography and Security. 2011;430-430   

Cryptographic Hash Functions
Practical Blockchains and Cryptocurrencies. 2020;37-45   

Digital Signatures Out of Second-Preimage Resistant Hash Functions
Lecture Notes in Computer Science. 2008;109-123   

Cryptographic Hash Functions
Encyclopedia of Database Systems. 2009;538-538   

A second preimage attack on zipper hash
Security and Communication Networks. 2015;8(16):2860-2866   
Link1 Link2 Link3

New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity
Selected Areas in Cryptography – SAC 2016. 2017;247-263   

Second Preimage Attack on a Chaos-Based Hash Function Construction and Its Improvement
Chaos and Complex Systems. 2012;131-140   

Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Lecture Notes in Computer Science. 2009;70-89   

This metadata service is kindly provided by CrossRef from May 29, 2014. Journal of Information Processing Systems has participated in CrossRef Text and Data Mining service since February 27, 2015.