Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
14
views
61
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
282
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
IP Operations and Management : 9th IEEE International Workshop, IPOM 2009, Venice, Italy, October 29-30, 2009. Proceedings
Triangulating Rebound Attack on AES-like Hashing
other
Author(s):
Xiaoyang Dong
,
Jian Guo
,
Shun Li
,
Phuong Pham
Publication date
(Online):
October 12 2022
Publisher:
Springer Nature Switzerland
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
61
Record
: found
Abstract
: not found
Book
: not found
The Design of Rijndael
Joan Daemen
,
Vincent Rijmen
(2002)
0
comments
Cited
195
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Certified Digital Signature
Ralph C. Merkle
(1990)
0
comments
Cited
89
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
How to Break MD5 and Other Hash Functions
Xiaoyun Wang
,
Hongbo Yu
(2005)
0
comments
Cited
76
times
– based on
0
reviews
Bookmark
All references
Author and book information
Contributors
Xiaoyang Dong:
(View ORCID Profile)
Jian Guo:
(View ORCID Profile)
Shun Li:
(View ORCID Profile)
Phuong Pham:
(View ORCID Profile)
Book Chapter
Publication date (Print):
2022
Publication date (Online):
October 12 2022
Pages
: 94-124
DOI:
10.1007/978-3-031-15802-5_4
SO-VID:
b725930e-d1a2-489d-88b4-85ad5dc4e81e
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 22
Edge-Based Self-supervision for Semi-supervised Few-Shot Microscopy Image Cell Segmentation
pp. 39
A Labeled Data Set for Flow-Based Intrusion Detection
pp. 94
Triangulating Rebound Attack on AES-like Hashing
pp. 118
From Black Box to Glass Box: Advancing Transparency in Artificial Intelligence Systems for Ethical and Trustworthy AI
pp. 204
Co-simulation of a Model Predictive Control System for Automotive Applications
pp. 249
COMPOSER: Compositional Reasoning of Group Activity in Videos with Keypoint-Only Modality
pp. 199
Towards Better Generalization for Neural Network-Based SAT Solvers
pp. 192
Remote Working: A Way to Foster Greater Inclusion and Accessibility?
Similar content
282
Engineering Graphical Captcha and AES Crypto Hash Functions for Secure Online Authentication
Authors:
Nafisah Kheshaifaty
,
Adnan A. Gutub
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
Authors:
Yu Sasaki
SoK: Analysis of Root Causes and Defense Strategies for Attacks on Microarchitectural Optimizations
Authors:
Nadja Ramhöj Holtryd
,
Madhavan Manivannan
,
Per Stenström
See all similar
Cited by
1
Rebound Attacks on \(\textsf{SKINNY}\) Hashing with Automatic Tools
Authors:
Shun Li
,
Guozhen Liu
,
Phuong Pham
See all cited by