Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,536,402 papers from all fields of science
Search
Sign In
Create Free Account
Birthday attack
Known as:
Birthday-attack
, Ataque de Aniversário
, Birthday bound
Expand
A birthday attack is a type of cryptographic attack that exploits the mathematics behind the birthday problem in probability theory. This attack can…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
34 relations
Alice and Bob
BHT algorithm
Block cipher
Brute-force attack
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed
Mustafa Khairallah
IACR Cryptology ePrint Archive
2019
Corpus ID: 199566948
In this article, we analyze two of the NIST Round 1 Candidates for the Lightweight Cryptography Standardization Process: COMET…
Expand
2019
2019
Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation
Yasir Nawaz
,
Lei Wang
Symmetry
2019
Corpus ID: 209353758
Designing a secure construction has always been a fascinating area for the researchers in the field of symmetric key cryptography…
Expand
2016
2016
Ataque Keres "Defensa Stoltz"
Gonzalo Giraldo García Camejo
,
Leandro Guerra Mojena
2016
Corpus ID: 193994753
El libro fue elaborado integramente por los dos autores. El mismo se divide en dos capitulos: el primero hace referencia a…
Expand
2011
2011
Desarrollo de un refractario MgO-CaZrO3 dopado con MgAl2O4 para la industria cementera
E. Rodríguez
,
G. Castillo
,
+4 authors
L. Ortiz
2011
Corpus ID: 190725290
Se presenta el desarrollo de un innovador ladri- llo basico libre de cromo basado en la tecnologia de MgO-CaZrO3, electrofundido…
Expand
2010
2010
Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited
Matthias Krause
,
Frederik Armknecht
,
E. Fleischmann
IACR Cryptology ePrint Archive
2010
Corpus ID: 1842858
2009
2009
Centro especializado primario en ataque cerebrovascular: Primera experiencia en Uruguay - Informe preliminar
Eduardo J. Legnani
,
H. Tarigo
,
C. Legnani
,
P. Braga
,
M. Bagés
2009
Corpus ID: 191361312
2006
2006
Ataque isquémico transitorio como expresión de trombosis de senos venosos durales
S. M. Palomo
,
J. A. Herrero
,
A. S. Ayala
,
M. J. Moya
2006
Corpus ID: 68477711
INTRODUCTION: Intracranial hypertension (ICHT) is the most frequent presenting syndrome of dural vein sinus thrombosis (CVT). A…
Expand
2005
2005
Situación actual de la viruela ante un ataque bioterrorista (II parte)
Esther Lombardo Aburto
,
A. G. Rivera
,
+4 authors
Esther Ortega Martínez
2005
Corpus ID: 73917480
El virus de la viruela se utilizo inicialmente como una arma biologica durante la guerra contra los indios americanos por los…
Expand
2003
2003
INTEGRATIVE COMPLEXITY OF WESTERN AND TERRORIST LEADERS IN THE WAR AGAINST THE AFGHAN TERRORIST REGIME
P. Suedfeld
2003
Corpus ID: 55094456
A number of research groups have devoted several decades of work to studying the information processing characteristics of…
Expand
2003
2003
Plano de marketing para a Associaçao Ataque Duplo de Jiu-Jitsu
S. Sa
2003
Corpus ID: 148898567
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE