Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,796,402 papers from all fields of science
Search
Sign In
Create Free Account
Collision attack
Known as:
Chosen prefix collision attack
, Chosen prefix collision
, Prefix collision attack
Expand
In cryptography, a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. In…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Birthday attack
Certificate authority
Code signing
Collision (computer science)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Detection of Collision Attacks and Comparison of Efficiency in Wireless Sensor Network
Punam Dandare
,
Vikrant Chole
2016
Corpus ID: 8022002
Wireless sensor networks (WSNs) consist of sensor nodes. It is a collection of wild number of low cost device constraint sensor…
Expand
2012
2012
Single-block collision attack on MD5
M.M.J. Stevens
IACR Cryptology ePrint Archive
2012
Corpus ID: 10199713
In 2010, Tao Xie and Dengguo Feng [XF10] constructed the rst single-block collision for MD5 consisting of two 64-byte messages…
Expand
2010
2010
Practical Near-Collisions for Reduced Round Blake, Fugue, Hamsi and JH | NIST
Meltem Sönmez Turan
,
Erdener Uyan
2010
Corpus ID: 14900745
A hash function is near-collision resistant, if it is hard to find two messages with hash values that differ in only a small…
Expand
2009
2009
Improvement and security analysis on MD5: Improvement and security analysis on MD5
Shaolan Zhang
,
Guobo Xing
,
Yixian Yang
2009
Corpus ID: 62650889
2009
2009
A Collision Attack on AURORA-512
Yu Sasaki
IACR Cryptology ePrint Archive
2009
Corpus ID: 9995921
In this note, we present a collision attack on AURORA-512, which is one of the candidates for SHA-3. The attack complexity is…
Expand
2008
2008
Creating a rogue CA certificate
A. Sotirov
,
M.M.J. Stevens
,
+4 authors
B. Weger
2008
Corpus ID: 58808693
Latest news [Dec. 31, 2008] Responses from Verisign (RapidSSL), Microsoft and Mozilla. [Jan. 2, 2009] Responses from TC…
Expand
2007
2007
Collision attack on reduced-round Camellia
Wenling Wu
,
D. Feng
Science in China Series F: Information Sciences
2007
Corpus ID: 1747697
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between…
Expand
2006
2006
Improved Collision Attack on Reduced Round Camellia
Guan Jie
,
Zhang Zhongya
Cryptology and Network Security
2006
Corpus ID: 39004921
Camellia is a 128-bit block cipher which has been selected as an international standard by ISO/IEC and a European encryption…
Expand
2005
2005
Collision attack on reduced-round Camellia
Wu Wenling
,
Feng Dengguo
2005
Corpus ID: 122245542
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between…
Expand
2001
2001
A New Design of the Hash Functions With All-or-Nothing Property
Sanguk Shin
,
K. Rhee
Journal of information science and engineering
2001
Corpus ID: 12900481
All-or-nothing property is a new encryption mode proposed by Rivest and has the property that one must decrypt the entire…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE