Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,235,434 papers from all fields of science
Search
Sign In
Create Free Account
Collision attack
Known as:
Chosen prefix collision attack
, Chosen prefix collision
, Prefix collision attack
Expand
In cryptography, a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. In…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Birthday attack
Certificate authority
Code signing
Collision (computer science)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
A review of collisions in cryptographic hash function used in digital forensic tools
Z. E. Rasjid
,
B. Soewito
,
G. Witjaksono
,
E. Abdurachman
International Conference on Computer Science and…
2017
Corpus ID: 65363230
Highly Cited
2017
Highly Cited
2017
Time efficient secure DNA based access control model for cloud computing environment
Suyel Namasudra
,
Pinki Roy
,
P. Vijayakumar
,
S. Audithan
,
B. Balusamy
Future generations computer systems
2017
Corpus ID: 7398981
2016
2016
Robustness and security enhancement of SHA with modified message digest and larger bit difference
Sandhya Verma
,
G. Prajapati
Symposium on Colossal Data Analysis and…
2016
Corpus ID: 16440229
Now a day's data is transmitted between users through internet in the form of multimedia. The data transmission requires less…
Expand
2015
2015
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
Yonglin Hao
,
D. Bai
,
Leibo Li
International Conference on Network and System…
2015
Corpus ID: 11205657
This paper describes a meet-in-the-middle (MITM) attack against the round reduced versions of the block cipher mCrypton-64/96…
Expand
2012
2012
A novel secure hash algorithm for public key digital signature schemes
Thulasimani Lakshmanan
,
M. Madheswaran
˜The œinternational Arab journal of information…
2012
Corpus ID: 8042355
Hash functions are the most widespread among all cryptographic primitives, and are currently used in multiple cryptographic…
Expand
2010
2010
Improved Collision Attacks on the Reduced-Round Grøstl Hash Function
K. Ideguchi
,
Elmar Tischhauser
,
B. Preneel
Information Security Conference
2010
Corpus ID: 1493336
We analyze the Grostl hash function, which is a 2nd-round candidate of the SHA-3 competition. Using the start-from-the-middle…
Expand
2010
2010
Practical Near-Collisions for Reduced Round Blake, Fugue, Hamsi and JH | NIST
Meltem Sönmez Turan
,
Erdener Uyan
2010
Corpus ID: 14900745
A hash function is near-collision resistant, if it is hard to find two messages with hash values that differ in only a small…
Expand
2009
2009
Improvement and security analysis on MD5: Improvement and security analysis on MD5
Shaolan Zhang
,
Guobo Xing
,
Yixian Yang
2009
Corpus ID: 62650889
2008
2008
How to Fill Up Merkle-Damgård Hash Functions
K. Yasuda
International Conference on the Theory and…
2008
Corpus ID: 383377
Many of the popular Merkle-Damgard hash functions have turned out to be not collision-resistant (CR). The problem is that we no…
Expand
2007
2007
Collision attack on reduced-round Camellia
Wenling Wu
,
D. Feng
Science in China Series F: Information Sciences
2007
Corpus ID: 1747697
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE