Results 81 to 90 of about 31,711 (108)
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
Thomas Espitau+2 more
openalex +1 more source
Preimage Attacks on Some Hashing Modes Instantiating Reduced-Round LBlock
Shiwei Chen, Chenhui Jin
openalex +1 more source
Preimage Attacks on the Round-reduced Keccak with Cross-linear Structures
Ting Li+3 more
openalex +2 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Insect species richness affects plant responses to multi‐herbivore attack
New Phytologist, 2021Maite Fernández De Bobadilla+2 more
exaly
A review of cancer immunotherapy toxicity
Ca-A Cancer Journal for Clinicians, 2020Lucy Boyce Kennedy
exaly
Exploring the Attack Surface of Blockchain: A Comprehensive Survey
IEEE Communications Surveys and Tutorials, 2020Muhammad Saad+2 more
exaly
False Data Injection Attack Detection in Power Systems Based on Cyber-Physical Attack Genes
Frontiers in Energy Research, 2021Yunchang Dong
exaly
Network security situation assessment with network attack behavior classification
International Journal of Intelligent Systems, 2022Zixin Zhang, Hongyu Yang, Lixia Xie
exaly
Study on attack paths of cyber attack in cyber‐physical power systems
IET Generation, Transmission and Distribution, 2020Chunxia Dou, Dong Yue, Jianbo Chen
exaly