# Birthday attack

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

2017

2017

- IACR Cryptology ePrint Archive
- 2017

In CRYPTO 2017, Mennink and Neves showed almost nbit security for a dual version of EWCDM. In this paper we describe a birthdayâ€¦Â (More)

Is this relevant?

2016

2016

- Theor. Comput. Sci.
- 2016

To examine the integrity and authenticity of an IP address efficiently and economically, this paper proposes a new non-iterativeâ€¦Â (More)

Is this relevant?

2015

2015

- 2015

The following paper briefly examines the origin and the mathematics behind the â€œBirthday Paradox" in a non-rigorous manner andâ€¦Â (More)

Is this relevant?

2015

2015

- 2015

RESUMEN La apariciÃ³n en este aÃ±o de siete estudios que demuestran la superioridad de la terapia endovascular (TEV) sobre elâ€¦Â (More)

Is this relevant?

2011

2011

- IACR Cryptology ePrint Archive
- 2011

Let r, B and w be positive integers. Let C be a linear code of length Bw and subspace of F2. The k-regular-decoding problem is toâ€¦Â (More)

Is this relevant?

2009

2009

- CRYPTO
- 2009

This paper develops several new techniques of cryptanalyzing MACs based on block ciphers, and is divided into two parts. Theâ€¦Â (More)

Is this relevant?

2008

2008

- IACR Cryptology ePrint Archive
- 2008

We present a birthday attack against DES. It is entirely based on the relationship Li+1 = Ri and the simple key schedule in DESâ€¦Â (More)

Is this relevant?

2007

2007

- 2007

Fix i and k with k = 2iâˆ’1. This paper presents a generalizedbirthday attack that uses a machine of size 2 for time 2 to find (m1â€¦Â (More)

Is this relevant?

2005

2005

- IACR Cryptology ePrint Archive
- 2005

We analyze a generic birthday attack where distinct inputs to some function f are selected until two of the inputs map through fâ€¦Â (More)

Is this relevant?

Highly Cited

2003

Highly Cited

2003

- IACR Cryptology ePrint Archive
- 2003

Textbooks tell us that a birthday attack on a hash function h with range size r requires r trials (hash computations) to find aâ€¦Â (More)

Is this relevant?