Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,379,577 papers from all fields of science
Search
Sign In
Create Free Account
Length extension attack
Known as:
Hash length extension attack
In cryptography and computer security, a length extension attack is a type of attack where an attacker can use Hash(message1) and the length of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Attack (computing)
Cryptographic hash function
Cryptography
Hash function
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Review On: Cryptographic Algorithms for Data Integrity Proofs in Cloud Storage
K. Devika
,
M. Jawahar
,
K. Nagar
2015
Corpus ID: 43730057
In cloud computing , there are many cryptographic algorithm for storing and retrieving data , the cryptographic algorithm is more…
Expand
2014
2014
LA CARRERA DE VELOCIDAD EN PERSONAS CON DISCAPACIDAD VISUAL THE SPRINT IN PERSONS WITH VISUALLY IMPAIRED
M. Torralba
,
J. Padullés
,
M. B. Vieira
,
Helena Olson
,
Clasificación Consejo de Europa
2014
Corpus ID: 114234402
The present study aimed to identify differences observed in the sprints races performed by visually impaired athletes. Data were…
Expand
2014
2014
Message Extension Attack against Authenticated Encryptions: Application to PANDA
Yu Sasaki
,
Lei Wang
Cryptology and Network Security
2014
Corpus ID: 26155621
In this paper, a new cryptanalysis approach for a class of authenticated encryption schemes is presented, which is inspired by…
Expand
2014
2014
Design and optimization tapered fiber with Negative Dielectrophoretic Effect for oil-in-water concentration sensor
Sheng Hu
,
Yong Zhao
IEEE Sensors. Proceedings
2014
Corpus ID: 12496884
This work presented the design and simulations of an integrated micro-electrodes into the tapered fiber aimed to improve the…
Expand
2014
2014
Study on the testing technology of the strong bending losses from the optical fiber cables released from the bobbin
Rong Wang
,
Zhenhua Li
,
B. Bian
,
Cheng-lin Liu
,
Yunjing Ji
Other Conferences
2014
Corpus ID: 108824697
In the process of the high speed pay-off of the optical fiber cables, there are some problems unsolved such as testing the broken…
Expand
2013
2013
Length-length and length-weight relationships of critically endangered striped cat fish Rita rita (Hamilton) from the Padda River near Rajshahi of Northwestern Bangladesh
Syeda Mushahida-Al-Noor
2013
Corpus ID: 130649415
The present study describes the length-length (LLR) relationships for critically endangered catfish Rita rita (Hamilton, 1822…
Expand
2011
2011
CBCR: CBC MAC with rotating transformations
Liting Zhang
,
Wenling Wu
,
Lei Zhang
,
Peng Wang
Science China Information Sciences
2011
Corpus ID: 10077089
Message authentication codes (MACs) are widely used to protect data integrity and data origin authentication in communications…
Expand
2010
2010
Length Extension Attack on Narrow-Pipe SHA-3 Candidates
D. Gligoroski
ICT Innovations
2010
Corpus ID: 71716586
In this paper we show that narrow-pipe SHA-3 candidates BLAKE-32, BLAKE-64, Hamsi, SHAvite-3-256, SHAvite-3-512, Skein-256-256…
Expand
1988
1988
Improvement of seed yield in field beans, phaseolus vulgaris L.,by using morphological components of yield as selection criteria
C. Agwanda
1988
Corpus ID: 85717550
This study was carried out with the objective of identifying the important quantitative predictors of yield and to assess the…
Expand
1980
1980
Mode Coupling and Power Transfer in a Coaxial Sector Waveguide with a Sector Angle Taper
A. Fliflet
,
L. Barnett
,
J. M. Baird
IEEE MTT-S International Microwave Symposium…
1980
Corpus ID: 27529582
We report a theoretical study of mode coupling and power transfer in a coaxial sector taper. The power transferred from the TE…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE