-
1
-
-
84855359000
-
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology, Cryptographic Hash Algorithm Competition, 2007.
-
(2007)
Cryptographic Hash Algorithm Competition
-
-
-
2
-
-
35048892549
-
Near-collisions of SHA-0
-
Lecture Notes in Comput. Sci. Springer Berlin
-
E. Biham, and R. Chen Near-collisions of SHA-0 Advances in Cryptology - CRYPTO 2004 Lecture Notes in Comput. Sci. vol. 3152 2004 Springer Berlin 290 305
-
(2004)
Advances in Cryptology - CRYPTO 2004
, vol.3152
, pp. 290-305
-
-
Biham, E.1
Chen, R.2
-
3
-
-
84957643546
-
Differential collisions in SHA-0
-
Lecture Notes in Comput. Sci. Springer Berlin
-
F. Chabaud, and A. Joux Differential collisions in SHA-0 Advances in Cryptology - CRYPTO 98 Lecture Notes in Comput. Sci. vol. 1462 1998 Springer Berlin 56 71
-
(1998)
Advances in Cryptology - CRYPTO 98
, vol.1462
, pp. 56-71
-
-
Chabaud, F.1
Joux, A.2
-
4
-
-
33646824396
-
Exploiting coding theory for collision attacks on SHA-1
-
Lecture Notes in Comput. Sci. Springer Berlin
-
N. Pramstaller, C. Rechberger, and V. Rijmen Exploiting coding theory for collision attacks on SHA-1 Cryptography and Coding Lecture Notes in Comput. Sci. vol. 3796 2005 Springer Berlin 78 95
-
(2005)
Cryptography and Coding
, vol.3796
, pp. 78-95
-
-
Pramstaller, N.1
Rechberger, C.2
Rijmen, V.3
-
6
-
-
79952608890
-
Optimal covering codes for finding near-collisions
-
Lecture Notes in Comput. Sci. Springer Heidelberg
-
M. Lamberger, and V. Rijmen Optimal covering codes for finding near-collisions Selected Areas in Cryptography Lecture Notes in Comput. Sci. vol. 6544 2011 Springer Heidelberg 187 197
-
(2011)
Selected Areas in Cryptography
, vol.6544
, pp. 187-197
-
-
Lamberger, M.1
Rijmen, V.2
-
9
-
-
84950781609
-
How to swindle Rabin
-
G. Yuval How to swindle Rabin Cryptologia 3 1979 187 191
-
(1979)
Cryptologia
, vol.3
, pp. 187-191
-
-
Yuval, G.1
-
10
-
-
0040553594
-
An improved Monte Carlo factorization algorithm
-
R.P. Brent An improved Monte Carlo factorization algorithm BIT 20 1980 176 184
-
(1980)
BIT
, vol.20
, pp. 176-184
-
-
Brent, R.P.1
-
11
-
-
0003280114
-
The art of computer programming, vol. 2
-
third ed. Addison-Wesley Series in Computer Science and Information Processing Addison-Wesley Publishing Co. Reading, MA
-
D.E. Knuth The art of computer programming, vol. 2 Seminumerical Algorithms third ed. Addison-Wesley Series in Computer Science and Information Processing 1997 Addison-Wesley Publishing Co. Reading, MA
-
(1997)
Seminumerical Algorithms
-
-
Knuth, D.E.1
-
12
-
-
1842610602
-
Cycle detection using a stack
-
G. Nivasch Cycle detection using a stack Inform. Process. Lett. 90 2004 135 140
-
(2004)
Inform. Process. Lett.
, vol.90
, pp. 135-140
-
-
Nivasch, G.1
-
13
-
-
17444376558
-
Parallel collision search with cryptanalytic applications
-
P.C. van Oorschot, and M.J. Wiener Parallel collision search with cryptanalytic applications J. Cryptology 12 1999 1 28
-
(1999)
J. Cryptology
, vol.12
, pp. 1-28
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
14
-
-
84915939958
-
Random mapping statistics
-
Houthalen, 1989 Lecture Notes in Comput. Sci. Springer Berlin
-
P. Flajolet, and A.M. Odlyzko Random mapping statistics Advances in Cryptology - EUROCRYPT 89 Houthalen, 1989 Lecture Notes in Comput. Sci. vol. 434 1990 Springer Berlin 329 354
-
(1990)
Advances in Cryptology - EUROCRYPT 89
, vol.434
, pp. 329-354
-
-
Flajolet, P.1
Odlyzko, A.M.2
-
15
-
-
0000702490
-
Probability distributions related to random mappings
-
B. Harris Probability distributions related to random mappings Ann. Math. Statist. 31 1960 1045 1062
-
(1960)
Ann. Math. Statist.
, vol.31
, pp. 1045-1062
-
-
Harris, B.1
-
16
-
-
0024830136
-
Log-concave and unimodal sequences in algebra, combinatorics, and geometry
-
Jinan, 1986 Ann. New York Acad. Sci. New York Acad. Sci. New York
-
R.P. Stanley Log-concave and unimodal sequences in algebra, combinatorics, and geometry Graph Theory and Its Applications: East and West Jinan, 1986 Ann. New York Acad. Sci. vol. 576 1989 New York Acad. Sci. New York 500 535
-
(1989)
Graph Theory and Its Applications: East and West
, vol.576
, pp. 500-535
-
-
Stanley, R.P.1
-
19
-
-
0028462216
-
An improvement of the van Wee bound for binary linear covering codes
-
R. Struik An improvement of the van Wee bound for binary linear covering codes IEEE Trans. Inform. Theory 40 1994 1280 1284
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, pp. 1280-1284
-
-
Struik, R.1
-
20
-
-
0023981711
-
Improved sphere bounds on the covering radius of codes
-
G.J.M. van Wee Improved sphere bounds on the covering radius of codes IEEE Trans. Inform. Theory 34 1988 237 245
-
(1988)
IEEE Trans. Inform. Theory
, vol.34
, pp. 237-245
-
-
Van Wee, G.J.M.1
-
21
-
-
0039879672
-
On a combinatorial conjecture of Erdos
-
D.J. Kleitman On a combinatorial conjecture of Erdos J. Combin. Theory 1 1966 209 214
-
(1966)
J. Combin. Theory
, vol.1
, pp. 209-214
-
-
Kleitman, D.J.1
-
22
-
-
70350669721
-
On the description of subsets, maximal with respect to cardinality, of given diameters in Hamming space
-
S.L. Bezrukov On the description of subsets, maximal with respect to cardinality, of given diameters in Hamming space Problemy Peredachi Informatsii 23 1987 106 109
-
(1987)
Problemy Peredachi Informatsii
, vol.23
, pp. 106-109
-
-
Bezrukov, S.L.1
|