Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,995,827 papers from all fields of science
Search
Sign In
Create Free Account
Collision attack
Known as:
Chosen prefix collision attack
, Chosen prefix collision
, Prefix collision attack
Expand
In cryptography, a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. In…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
41 relations
Birthday attack
Certificate authority
Code signing
Collision (computer science)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Time efficient secure DNA based access control model for cloud computing environment
Suyel Namasudra
,
Pinki Roy
,
P. Vijayakumar
,
S. Audithan
,
B. Balusamy
Future generations computer systems
2017
Corpus ID: 7398981
2015
2015
A Meet-in-the-Middle Attack on Round-Reduced mCrypton Using the Differential Enumeration Technique
Yonglin Hao
,
D. Bai
,
Leibo Li
International Conference on Network and System…
2015
Corpus ID: 11205657
This paper describes a meet-in-the-middle (MITM) attack against the round reduced versions of the block cipher mCrypton-64/96…
Expand
2010
2010
Practical Near-Collisions for Reduced Round Blake, Fugue, Hamsi and JH | NIST
Meltem Sönmez Turan
,
Erdener Uyan
2010
Corpus ID: 14900745
A hash function is near-collision resistant, if it is hard to find two messages with hash values that differ in only a small…
Expand
2009
2009
Improvement and security analysis on MD5: Improvement and security analysis on MD5
Shaolan Zhang
,
Guobo Xing
,
Yixian Yang
2009
Corpus ID: 62650889
2008
2008
Video Authentication against Correlation Analysis Attack in Wireless Network
Ju Wang
,
Jonathan C. L. Liu
Tenth IEEE International Symposium on Multimedia
2008
Corpus ID: 32446905
Transporting live Image/video data thought a Wireless Network is required in many applications (such as video wireless sensor…
Expand
2008
2008
How to Fill Up Merkle-Damgård Hash Functions
K. Yasuda
International Conference on the Theory and…
2008
Corpus ID: 383377
Many of the popular Merkle-Damgard hash functions have turned out to be not collision-resistant (CR). The problem is that we no…
Expand
2007
2007
A Meet-in-the-Middle Collision Attack Against the New FORK-256
Markku-Juhani O. Saarinen
IACR Cryptology ePrint Archive
2007
Corpus ID: 14898923
We show that a 2112.9 collision attack exists against the FORK-256 Hash Function. The attack is surprisingly simple compared to…
Expand
2007
2007
Collision attack on reduced-round Camellia
Wenling Wu
,
D. Feng
Science in China Series F: Information Sciences
2007
Corpus ID: 1747697
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between…
Expand
2005
2005
Collision attack on reduced-round Camellia
WuWen-Ling
,
FengDeng-Guo
2005
Corpus ID: 118152883
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper,we construct some efficient distinguishers between…
Expand
2005
2005
Collision attack on reduced-round Camellia
Wu Wenling
,
Feng Dengguo
2005
Corpus ID: 122245542
Camellia is the final winner of 128-bit block cipher in NESSIE. In this paper, we construct some efficient distinguishers between…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE