Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
33
views
0
references
Top references
cited by
15
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,630
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – CRYPTO 2017
The First Collision for Full SHA-1
other
Author(s):
Marc Stevens
,
Elie Bursztein
,
Pierre Karpman
,
Ange Albertini
,
Yarik Markov
Publication date
(Online):
July 29 2017
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
UCL: UN SDG 01 No Poverty
Author and book information
Book Chapter
Publication date (Print):
2017
Publication date (Online):
July 29 2017
Pages
: 570-596
DOI:
10.1007/978-3-319-63688-7_19
SO-VID:
94606e30-458c-4ac8-82c7-9c3ebd88248b
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Stronger Security for Reusable Garbled Circuits, General Definitions and Attacks
pp. 36
Generic Transformations of Predicate Encodings: Constructions and Applications
pp. 101
Memory-Tight Reductions
pp. 133
Be Adaptive, Avoid Overcommitting
pp. 188
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic
pp. 223
Secure Arithmetic Computation with Constant Computational Overhead
pp. 255
Encryption Switching Protocols Revisited: Switching Modulo p
pp. 291
The Bitcoin Backbone Protocol with Chains of Variable Difficulty
pp. 324
Bitcoin as a Transaction Ledger: A Composable Treatment
pp. 357
Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol
pp. 391
Robust Non-interactive Multiparty Computation Against Constant-Size Collusion
pp. 420
The Price of Low Communication in Secure Multi-party Computation
pp. 447
Topology-Hiding Computation on All Graphs
pp. 468
A New Approach to Round-Optimal Secure Multiparty Computation
pp. 503
Watermarking Cryptographic Functionalities from Standard Lattice Assumptions
pp. 537
Identity-Based Encryption from the Diffie-Hellman Assumption
pp. 570
The First Collision for Full SHA-1
pp. 599
Indistinguishability Obfuscation from SXDH on 5-Linear Maps and Locality-5 PRGs
pp. 630
Indistinguishability Obfuscation from Trilinear Maps and Block-Wise Local PRGs
pp. 661
Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives
pp. 696
Structure vs. Hardness Through the Obfuscation Lens
pp. 727
Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and Separations
pp. 758
Conditional Disclosure of Secrets via Non-linear Reconstruction
Similar content
1,630
A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2
Authors:
Xiaofeng Liao
,
Saleem Ullah
,
Rehan Ashraf
…
Temporin-SHa peptides grafted on gold surfaces display antibacterial activity.
Authors:
Andres Lombana
,
Zahid Raja
,
Sandra Casale
…
SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions
Authors:
Morris J. Dworkin
See all similar
Cited by
15
Experimental quantum secure network with digital signatures and encryption
Authors:
Hua-Lei Yin
,
Yao Fu
,
Chen-Long Li
…
Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions
Authors:
Ilan Komargodski
,
Moni Naor
,
Eylon Yogev
Quantum Collision Attacks on Reduced SHA-256 and SHA-512
Authors:
Akinori Hosoyamada
,
Yu Sasaki
See all cited by