Results 51 to 60 of about 31,711 (108)
A Quantum-Resistant Photonic Hash Function [PDF]
We propose a quantum hash function based on Gaussian boson sampling on a photonic quantum computer, aiming to provide quantum-resistant security. Extensive simulations demonstrate that this hash function exhibits strong properties of preimage, second preimage, and collision resistance, which are essential for cryptographic applications.
arxiv
Improving security of lightweith SHA-3 against preimage attacks [PDF]
Serhii Onopa, Zbigniew Kotulski
openalex +1 more source
Preimage Attacks on 3, 4, and 5-Pass HAVAL [PDF]
Yu Sasaki, Kazumaro Aoki
openalex +1 more source
A (Second) Preimage Attack on the GOST Hash Function [PDF]
Florian Mendel+2 more
openalex +1 more source
Improved Preimage Attacks on 3-Round Keccak-224/256
Xiaoen Lin, Le He, Hongbo Yu
openalex +2 more sources
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool [PDF]
Yu Sasaki
openalex +1 more source
Erratum: Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks [PDF]
Yu Sasaki+3 more
openalex +1 more source
Preimage Attack on MD4 Hash Function as a Problem of Parallel Sat-Based Cryptanalysis
Irina Gribanova+3 more
openalex +2 more sources
Preimage and Collision Attacks on MD2 [PDF]
Lars R. Knudsen, John Erik Mathiassen
openalex +1 more source
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2 [PDF]
Li Ji, Takanori Isobe, Kyoji Shibutani
openalex +1 more source