Skip to search formSkip to main contentSkip to account menu

Rebound attack

Known as: The Rebound Attack 
The rebound attack is a tool in the cryptanalysis of cryptographic hash functions. The attack was first published in 2009 by Florian Mendel… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
The positive criminology perspective looks at positive life influences that distance individuals from offending, and enable the… 
Review
2015
Review
2015
2012
2012
The ISO impact damping test characterizes wheelchair cushion abili:es to reduce impact… 
2011
2011
The hash function JH [20] is one of the five finalists of the NIST SHA-3 hash competition. It has been recently tweaked for the… 
Highly Cited
2010
Highly Cited
2010
Grostl is one of 14 second round candidates of the NIST SHA-3 competition. Cryptanalytic results on the wide-pipe compression… 
2010
2010
JH, designed by Wu, is one of the 14 second-round candidates in the NIST Hash Competition. This paper presents the first analysis… 
2003
2003
An analog hardware neuron model having biological neuron characteristics is proposed and its basic characteristics are reported… 
Highly Cited
2002
Highly Cited
2002
We have investigated the roles of peripheral and central , , and opioid receptors and their subtypes in opioid-induced… 
1999
1999
Open sections along Kongsfjodhallet, the north-western coast Kongsfjorden, Svalbard, exhibit marine and glacigenic sediments of… 
1935
1935
Investigations of the cerebellar nuclei and the white matter adjacent to them have been very few in number as compared with many…