Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,257,085 papers from all fields of science
Search
Sign In
Create Free Account
Rebound attack
Known as:
The Rebound Attack
The rebound attack is a tool in the cryptanalysis of cryptographic hash functions. The attack was first published in 2009 by Florian Mendel…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
17 relations
Block cipher
Byte
Collision attack
Cryptanalysis
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Long term recovery from addiction : criminal justice involvement and positive criminology ?
D. Best
,
Elizabeth V. Aston
2018
Corpus ID: 73655073
The positive criminology perspective looks at positive life influences that distance individuals from offending, and enable the…
Expand
Review
2015
Review
2015
Hypokalemia and Hyperkalemia
Jesse Theisen-Toupal
2015
Corpus ID: 71610503
2012
2012
Assessment of the ISO Impact Damping Test
S. Sprigle
,
B. Chung
,
T. Meyer
2012
Corpus ID: 113755101
The ISO impact damping test characterizes wheelchair cushion abili:es to reduce impact…
Expand
2011
2011
Rebound Attack on JH42
M. Naya-Plasencia
,
Deniz Toz
,
Kerem Varici
International Conference on the Theory and…
2011
Corpus ID: 1027967
The hash function JH [20] is one of the five finalists of the NIST SHA-3 hash competition. It has been recently tweaked for the…
Expand
Highly Cited
2010
Highly Cited
2010
Rebound Attacks on the Reduced Grøstl Hash Function
Florian Mendel
,
Christian Rechberger
,
Martin Schläffer
,
Søren S. Thomsen
The Cryptographer's Track at RSA Conference
2010
Corpus ID: 17073218
Grostl is one of 14 second round candidates of the NIST SHA-3 competition. Cryptanalytic results on the wide-pipe compression…
Expand
2010
2010
Rebound Attack on Reduced-Round Versions of JH
V. Rijmen
,
Deniz Toz
,
Kerem Varici
Fast Software Encryption Workshop
2010
Corpus ID: 18486608
JH, designed by Wu, is one of the 14 second-round candidates in the NIST Hash Competition. This paper presents the first analysis…
Expand
2003
2003
Analog LSI neuron model inspired by biological excitable membrane
S. Kanoh
,
M. Imai
,
N. Hoshimiya
Systems and Computers in Japan
2003
Corpus ID: 13091372
An analog hardware neuron model having biological neuron characteristics is proposed and its basic characteristics are reported…
Expand
Highly Cited
2002
Highly Cited
2002
Functional Effects of Systemically Administered Agonists and Antagonists of , , and Opioid Receptor Subtypes on Body Temperature in Mice
A. Baker
,
T. Meert
2002
Corpus ID: 37073118
We have investigated the roles of peripheral and central , , and opioid receptors and their subtypes in opioid-induced…
Expand
1999
1999
Pleistocene stratigraphy of Kongsfjordhallet, Spitsbergen, Svalbard
M. Houmark‐Nielsen
,
S. Funder
1999
Corpus ID: 56317980
Open sections along Kongsfjodhallet, the north-western coast Kongsfjorden, Svalbard, exhibit marine and glacigenic sediments of…
Expand
1935
1935
ELECTRICAL STIMULATION OF THE INTERIOR OF THE CEREBELLUM IN THE MONKEY
H. Magoun
,
W. Hare
,
S. W. Ranson
1935
Corpus ID: 50610446
Investigations of the cerebellar nuclei and the white matter adjacent to them have been very few in number as compared with many…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE