Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
7
views
16
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,332
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Network and System Security : 16th International Conference, NSS 2022, Denarau Island, Fiji, December 9–12, 2022, Proceedings
Rebound Attacks on \(\textsf{SKINNY}\) Hashing with Automatic Tools
other
Author(s):
Shun Li
,
Guozhen Liu
,
Phuong Pham
Publication date
(Online):
December 07 2022
Publisher:
Springer Nature Switzerland
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
REPO4EU WP2 Tools
Most cited references
16
Record
: found
Abstract
: not found
Conference Proceedings
: not found
A fast quantum mechanical algorithm for database search
Lov Grover
(1996)
0
comments
Cited
177
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Design Principle for Hash Functions
Ivan Damgard
(1990)
0
comments
Cited
72
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
One Way Hash Functions and DES
Ralph C. Merkle
(1990)
0
comments
Cited
58
times
– based on
0
reviews
Bookmark
All references
Author and book information
Contributors
Shun Li:
(View ORCID Profile)
Guozhen Liu:
(View ORCID Profile)
Phuong Pham:
(View ORCID Profile)
Book Chapter
Publication date (Print):
2022
Publication date (Online):
December 07 2022
Pages
: 649-666
DOI:
10.1007/978-3-031-23020-2_37
SO-VID:
1f0cba56-2f42-4060-a5b6-bc109ad6f9a3
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Vulnerability Detection Using Deep Learning Based Function Classification
pp. 23
RAIDER: Reinforcement-Aided Spear Phishing Detector
pp. 51
Network Intrusion Detection Adversarial Attacks for LEO Constellation Networks Based on Deep Learning
pp. 66
A Proof of Concept Implementation of Explainable Artificial Intelligence (XAI) in Digital Forensics
pp. 86
Graph Intelligence Enhanced Bi-Channel Insider Threat Detection
pp. 105
Exploiting Redundancy in Network Flow Information for Efficient Security Attack Detection
pp. 120
A Learning Methodology for Line-Rate Ransomware Mitigation with P4 Switches
pp. 140
Reducing Intrusion Alert Trees to Aid Visualization
pp. 155
Attacker Attribution via Characteristics Inference Using Honeypot Data
pp. 170
Detecting Contradictions from CoAP RFC Based on Knowledge Graph
pp. 193
A First Look at Android Apps’ Third-Party Resources Loading
pp. 214
Comprehensive Mobile Traffic Characterization Based on a Large-Scale Mobile Traffic Dataset
pp. 233
DOT-M: A Dual Offline Transaction Scheme of Central Bank Digital Currency for Trusted Mobile Devices
pp. 249
A Beyond-5G Authentication and Key Agreement Protocol
pp. 267
A Survey on IoT Vulnerability Discovery
pp. 283
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks
pp. 305
An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks
pp. 319
Leveraging Frame Aggregation in Wi-Fi IoT Networks for Low-Rate DDoS Attack Detection
pp. 335
Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset
pp. 357
The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated Learning
pp. 374
A Privacy-Preserving Distributed Machine Learning Protocol Based on Homomorphic Hash Authentication
pp. 387
An Efficient Clustering-Based Privacy-Preserving Recommender System
pp. 406
A Differential Privacy Mechanism for Deceiving Cyber Attacks in IoT Networks
pp. 429
Privacy-Preserving Online Ride-Hailing Matching System with an Untrusted Server
pp. 443
Efficient and Fine-Grained Sharing of Signed Healthcare Data in Smart Healthcare
pp. 459
Enabling Secure Deduplication in Encrypted Decentralized Storage
pp. 476
Geometric Range Searchable Encryption with Forward and Backward Security
pp. 499
Towards Secure and Trustworthy Flash Loans: A Blockchain-Based Trust Management Approach
pp. 514
Forward Traceability for Product Authenticity Using Ethereum Smart Contracts
pp. 524
BSB: Bringing Safe Browsing to Blockchain Platform
pp. 547
Practical Anonymous Multi-hop Locks for Lightning Network Compatible Payment Channel Networks
pp. 561
Blockchain Based Regulatory Technology Deployment for Real Estate Transaction
pp. 580
CVallet: A Blockchain-Oriented Application Development for Education and Recruitment
pp. 598
Decentralized Access Control for Secure Microservices Cooperation with Blockchain
pp. 615
Blockchain-Based Access Control for Secure Smart Industry Management Systems
pp. 633
Driver Locations Harvesting Attack on pRide
pp. 649
Rebound Attacks on \(\textsf{SKINNY}\) Hashing with Automatic Tools
pp. 667
A Combination Reduction Algorithm and Its Application
pp. 687
Evaluating the Security of Merkle-Damgård Hash Functions and Combiners in Quantum Settings
pp. 712
An Efficient Lattice-Based Encrypted Search Scheme with Forward Security
pp. 727
Strengthening the Security of AES Against Differential Fault Attack
Similar content
4,332
QR Factorization of Tall and Skinny Matrices in a Grid Computing Environment
Authors:
Emmanuel Agullo
,
Camille Coti
,
Jack Dongarra
…
Analysis of aes, skinny, and others with constraint programming
Authors:
S Sun
,
D Gerault
,
P Lafourcade
…
The skinny on neurotrophins.
Authors:
Laura Wisse
,
Michael W. Schwartz
See all similar