Skip to search formSkip to main contentSkip to account menu

Length extension attack

Known as: Hash length extension attack 
In cryptography and computer security, a length extension attack is a type of attack where an attacker can use Hash(message1) and the length of… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
The different of Ag-11Au-4.5Pd and Ag-11Au-4.5Pd-0.1Y alloy bonding wire mechanical properties, fusing current and structure were… 
Review
2015
Review
2015
In cloud computing , there are many cryptographic algorithm for storing and retrieving data , the cryptographic algorithm is more… 
2014
2014
The present study aimed to identify differences observed in the sprints races performed by visually impaired athletes. Data were… 
2014
2014
In the process of the high speed pay-off of the optical fiber cables, there are some problems unsolved such as testing the broken… 
2013
2013
The present study describes the length-length (LLR) relationships for critically endangered catfish Rita rita (Hamilton, 1822… 
2011
2011
Message authentication codes (MACs) are widely used to protect data integrity and data origin authentication in communications… 
2010
2010
In this paper we show that narrow-pipe SHA-3 candidates BLAKE-32, BLAKE-64, Hamsi, SHAvite-3-256, SHAvite-3-512, Skein-256-256… 
2002
2002
Abstract : A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been… 
1988
1988
This study was carried out with the objective of identifying the important quantitative predictors of yield and to assess the… 
1980
1980
We report a theoretical study of mode coupling and power transfer in a coaxial sector taper. The power transferred from the TE…