Collision attack

Known as: Chosen prefix collision attack, Chosen prefix collision, Prefix collision attack 
In cryptography, a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. In… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
On the one hand, collision attacks have been introduced in the context of side-channel analysis for attackers who exploit… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2014
2014
Hash functions have been among the most scrutinized cryptographic primitives in the previous decade, mainly due to the… (More)
  • table 1
  • table 2
  • figure 1
  • table 3
Is this relevant?
2013
2013
We presented the first single block collision attack on MD5 with complexity of 2 MD5 compressions and posted the challenge for… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
Boole is a hash function designed by Gregory Rose and was submitted to the NIST Hash competition. It is a stream cipher based… (More)
  • figure 1
  • table 1
  • figure 2
  • table 3
  • figure 3
Is this relevant?
2006
2006
In this paper, we present an improved attack algorithm to find two-block collisions of the hash function MD5. The attack uses the… (More)
  • table 7-1
  • table A-1
  • table A-2
  • table A-3
  • table A-4
Is this relevant?
2005
2005
In this paper, we propose an attack method to find collisions of MD4 hash function. This attack is the improved version of the… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 6
Is this relevant?
2005
2005
In this paper, we present a fast attack algorithm to find two-block collision of hash function MD5. The algorithm is based on the… (More)
  • table 1
  • table 3
  • table 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Until now in cryptography the term collision was mainly associated with the surjective mapping of different inputs to an equal… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Rijndael is one of the ve candidate blockciphers selected by NIST for the nal phase of the AES selection process. The best attack… (More)
  • figure 1
  • figure 2
Is this relevant?