Results 161 to 170 of about 4,920 (187)
Generative AI in Medical Practice: In-Depth Exploration of Privacy and Security Challenges.
Chen Y, Esmaeilzadeh P.
europepmc +1 more source
(Inner-Product) Functional Encryption with Updatable Ciphertexts. [PDF]
Cini V +4 more
europepmc +1 more source
Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5.
Jean-Philippe Aumasson +2 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Preimage Attack on Hash Function RIPEMD
Journal of Computer Science and Technology, 2009RIPEMD is a cryptographic hash function devised in the framework of the RIPE project (RACE Integrity Primitives Evaluation, 1988-1992). It consists of two parallel lines, and each line is identical to MD4 except for some internal constants. It has been broken by the collision attack, but no preimage attack was given.
Gaoli Wang, Shaohui Wang
openaire +3 more sources
Preimage Attacks against Variants of Very Smooth Hash
2010In this paper, we show that some new variants of the Very Smooth Hash (VSH) hash function are susceptible to similar types of preimage attacks as the original VSH. We also generalise the previous mathematical results, which have been used in the preimage attacks. VSH is a hash function based on the multiexponentiation of prime numbers modulo some large
Röning Juha, Halunen Kimmo
openaire +1 more source
Inverse operation and preimage attack on BioHashing
2009 IEEE Workshop on Computational Intelligence in Biometrics: Theory, Algorithms, and Applications, 2009BioHashing generates a BioCode from a user's biometric features by projecting them onto user-specific random vectors and then discritizes the projection coefficients into zero or one. Since biometric features are distorted by the non-invertible transforms and template matching is performed in a transformed state, it has been claimed that BioHashing is ...
null Yongjin Lee +2 more
openaire +1 more source
Improved Preimage Attacks against Reduced HAS-160
2014HAS-160 is a Korean industry standard for hash functions. It has a similar structure to SHA-1 and produces a 160-bit hash value. In this paper, we propose improved preimage attacks against step-reduced HAS-160 using the differential meet-in-the-middle technique and initial structure.
Ronglin Hao +3 more
+4 more sources
Preimage Attacks on Step-Reduced MD5
2008In this paper, we propose preimage attacks on step-reduced MD5. We show that a preimage of a 44-step MD5 can be computed to a complexity of 296. We also consider a preimage attack against variants of MD5 where the round order is modified from the real MD5.
Yu Sasaki, Kazumaro Aoki
openaire +1 more source

