Cryptography in Blockchain
暂无分享,去创建一个
[1] Florian Mendel,et al. Improving Local Collisions: New Attacks on Reduced SHA-256 , 2013, EUROCRYPT.
[2] Jian Guo,et al. Preimages for Step-Reduced SHA-2 , 2009, IACR Cryptol. ePrint Arch..
[3] Christophe De Cannière,et al. Preimages for Reduced SHA-0 and SHA-1 , 2008, CRYPTO.
[4] Amr M. Youssef,et al. Fault Analysis of Kuznyechik , 2015, IACR Cryptol. ePrint Arch..
[5] Shahram Khazaei,et al. New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba , 2008, FSE.
[6] Vincent Rijmen,et al. On the Collision Resistance of RIPEMD-160 , 2006, ISC.
[7] Hongjun Wu,et al. Improving the Biclique Cryptanalysis of AES , 2015, ACISP.
[8] Palash Sarkar,et al. New Collision Attacks against Up to 24-Step SHA-2 , 2008, INDOCRYPT.
[9] Yonglin Hao,et al. The Boomerang Attacks on BLAKE and BLAKE2 , 2014, Inscrypt.
[10] Bernard L. Menezes,et al. Highly Efficient Algorithms for AES Key Retrieval in Cache Access Attacks , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[11] Frederic P. Miller,et al. Advanced Encryption Standard , 2009 .
[12] Sasu Tarkoma,et al. Networking and Messaging , 2012 .
[13] Søren S. Thomsen. An improved preimage attack on MD2 , 2008, IACR Cryptol. ePrint Arch..
[14] Marc Stevens,et al. The First Collision for Full SHA-1 , 2017, CRYPTO.
[15] Lars R. Knudsen,et al. Cryptanalysis of MD2 , 2009, Journal of Cryptology.
[16] Jian Guo,et al. Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak , 2017, CRYPTO.
[17] Thomas Peyrin,et al. The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function , 2014, Selected Areas in Cryptography.