Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,372,481 papers from all fields of science
Search
Sign In
Create Free Account
Length extension attack
Known as:
Hash length extension attack
In cryptography and computer security, a length extension attack is a type of attack where an attacker can use Hash(message1) and the length of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Attack (computing)
Cryptographic hash function
Cryptography
Hash function
Expand
Broader (1)
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Effect of Ag-11Au-4.5Pd alloy bonding wire properties and structure on bond strengths and reliability
Jun Cao
,
Junling Fan
,
W. Gao
International Conference on Electronics Packaging
2016
Corpus ID: 30118407
The different of Ag-11Au-4.5Pd and Ag-11Au-4.5Pd-0.1Y alloy bonding wire mechanical properties, fusing current and structure were…
Expand
Review
2015
Review
2015
Review On: Cryptographic Algorithms for Data Integrity Proofs in Cloud Storage
K. Devika
,
M. Jawahar
,
K. Nagar
2015
Corpus ID: 43730057
In cloud computing , there are many cryptographic algorithm for storing and retrieving data , the cryptographic algorithm is more…
Expand
2014
2014
LA CARRERA DE VELOCIDAD EN PERSONAS CON DISCAPACIDAD VISUAL THE SPRINT IN PERSONS WITH VISUALLY IMPAIRED
M. Torralba
,
J. Padullés
,
M. B. Vieira
,
Helena Olson
,
Clasificación Consejo de Europa
2014
Corpus ID: 114234402
The present study aimed to identify differences observed in the sprints races performed by visually impaired athletes. Data were…
Expand
2014
2014
Study on the testing technology of the strong bending losses from the optical fiber cables released from the bobbin
Rong Wang
,
Zhenhua Li
,
B. Bian
,
Cheng-lin Liu
,
Yun-jing Ji
Other Conferences
2014
Corpus ID: 108824697
In the process of the high speed pay-off of the optical fiber cables, there are some problems unsolved such as testing the broken…
Expand
2013
2013
Length-length and length-weight relationships of critically endangered striped cat fish Rita rita (Hamilton) from the Padda River near Rajshahi of Northwestern Bangladesh
Syeda Mushahida-Al-Noor
2013
Corpus ID: 130649415
The present study describes the length-length (LLR) relationships for critically endangered catfish Rita rita (Hamilton, 1822…
Expand
2011
2011
CBCR: CBC MAC with rotating transformations
Liting Zhang
,
Wenling Wu
,
Lei Zhang
,
Peng Wang
Science China Information Sciences
2011
Corpus ID: 10077089
Message authentication codes (MACs) are widely used to protect data integrity and data origin authentication in communications…
Expand
2010
2010
Length Extension Attack on Narrow-Pipe SHA-3 Candidates
D. Gligoroski
ICT Innovations
2010
Corpus ID: 71716586
In this paper we show that narrow-pipe SHA-3 candidates BLAKE-32, BLAKE-64, Hamsi, SHAvite-3-256, SHAvite-3-512, Skein-256-256…
Expand
2002
2002
Identifying Potential Type Confusion in Authenticated Messages
C. Meadows
2002
Corpus ID: 12485198
Abstract : A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been…
Expand
1988
1988
Improvement of seed yield in field beans, phaseolus vulgaris L.,by using morphological components of yield as selection criteria
C. Agwanda
1988
Corpus ID: 85717550
This study was carried out with the objective of identifying the important quantitative predictors of yield and to assess the…
Expand
1980
1980
Mode Coupling and Power Transfer in a Coaxial Sector Waveguide with a Sector Angle Taper
A. Fliflet
,
L. Barnett
,
J. M. Baird
IEEE MTT-S International Microwave Symposium…
1980
Corpus ID: 27529582
We report a theoretical study of mode coupling and power transfer in a coaxial sector taper. The power transferred from the TE…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE