Revisiting The Security Of Dbhts Macs: Beyond-Birthday-Bound In The Multi-User Setting | 0 | 0.34 | 2021 |
Secure key-alternating Feistel ciphers without key schedule. | 1 | 0.38 | 2021 |
Highly Secure Privacy-Preserving Outsourced k-Means Clustering under Multiple Keys in Cloud Computing | 0 | 0.34 | 2020 |
A New General Method of Searching for Cubes in Cube Attacks. | 0 | 0.34 | 2020 |
Generic Attacks on Hash Combiners. | 1 | 0.34 | 2019 |
Beyond-birthday secure domain-preserving PRFs from a single permutation | 0 | 0.34 | 2019 |
A Novel Speech Enhancement System Based On The Coherence-Based Algorithm And The Differential Beamforming | 0 | 0.34 | 2018 |
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. | 0 | 0.34 | 2017 |
Generic Internal State Recovery On Strengthened Hmac: N-Bit Secure Hmac Requires Key In All Blocks | 0 | 0.34 | 2016 |
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers. | 5 | 0.40 | 2016 |
Practical Forgeries And Distinguishers Against Paes | 1 | 0.35 | 2016 |
Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC. | 0 | 0.34 | 2016 |
Cryptanalysis of JAMBU. | 0 | 0.34 | 2015 |
Bitwise Partial-Sum: A New Tool For Integral Analysis Against Arx Designs | 0 | 0.34 | 2015 |
Immune optimization approach solving multi-objective chance-constrained programming. | 3 | 0.38 | 2015 |
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. | 5 | 0.43 | 2015 |
Known-Key Distinguisher on Full PRESENT. | 5 | 0.42 | 2015 |
Analysis of the CAESAR Candidate Silver. | 1 | 0.39 | 2015 |
Message Extension Attack against Authenticated Encryptions: Application to PANDA | 0 | 0.34 | 2014 |
Updates on Generic Attacks against HMAC and NMAC. | 9 | 0.49 | 2014 |
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks. | 2 | 0.37 | 2014 |
Cryptanalysis of Round-Reduced \mathttLED. | 0 | 0.34 | 2013 |
Improved Cryptanalysis of Reduced RIPEMD-160. | 4 | 0.61 | 2013 |
The parallel-cut meet-in-the-middle attack | 1 | 0.36 | 2013 |
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks | 19 | 0.64 | 2012 |
New truncated differential cryptanalysis on 3d block cipher | 1 | 0.36 | 2012 |
Distinguishers beyond three rounds of the RIPEMD-128/-160 compression functions | 13 | 0.56 | 2012 |
Three-subset meet-in-the-middle attack on reduced XTEA | 4 | 0.39 | 2012 |
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach | 14 | 0.62 | 2011 |
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl | 19 | 0.84 | 2010 |
Finding preimages of tiger up to 23 steps | 5 | 0.61 | 2010 |
Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model | 13 | 1.12 | 2009 |
Bit-Free Collision: Application to APOP Attack | 5 | 0.43 | 2009 |
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! | 4 | 0.41 | 2009 |
Security of MD5 challenge and response: extension of APOP password recovery attack | 14 | 0.65 | 2008 |
New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5 | 28 | 0.94 | 2008 |
Password recovery on challenge and response: impossible differential attack on hash function | 3 | 0.43 | 2008 |
New message difference for MD4 | 9 | 0.57 | 2007 |