iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: http://citations.springer.com/item?doi=10.1007/978-3-319-63688-7_19
SpringerCitations - Details Page

Citation Details

Chapter

The First Collision for Full SHA-1

Advances in Cryptology – CRYPTO 2017, 2017, Volume 10401

ISBN : 978-3-319-63687-0

Marc Stevens, Elie Bursztein, Pierre Karpman, Show All (5) Ange Albertini, Yarik Markov

165 Items cite this Chapter

Page: 1 | 2 | 3 | > | >>

Conference Paper

A novel approach for secure identity authentication in legacy database systems

Juanita Blue, Eoghan Furey and Joan Condell

Conference: 2017 28th Irish Signals and Systems Conference (ISSC), Year: 2017, Page 1

Read Online

Article

A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications

Atakan Arslan, Sultan Aldırmaz Çolak and Sarp Ertürk

Journal: Wireless Personal Communications, 2021, Volume 120, Number 4, Page 2653

Read Online

Chapter

Advances in Cryptology – EUROCRYPT 2023

Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li and Takanori Isobe

Series: Lecture Notes in Computer Science, Year: 2023, Volume 14007, Page 189

Read Online

Chapter

E-Business and Telecommunications

Adam Janovsky, Davide Maiorca, Dominik Macko, Vashek Matyas and Giorgio Giacinto

Series: Communications in Computer and Information Science, Year: 2023, Volume 1849, Page 69

Read Online

Chapter

Symmetric Cryptography 2

Marc STEVENS

Year: 2024, Page 181

Read Online

Conference Paper

Automated Detection of Cryptographic Inconsistencies in Android’s Keymaster Implementations

Abdullah Imran and Antonio Bianchi

Conference: Proceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services, Year: 2024, Page 385

Read Online

Article

An improved lightweight anonymous user authenticated session key exchange scheme for Internet of Things

Devender Kumar, Siddharth Jain, Aasif Khan and Pranav Sarv Pathak

Journal: Journal of Ambient Intelligence and Humanized Computing, 2023, Volume 14, Number 5, Page 5067

Read Online

Article

Enhancement of Password Security by using Access Log-based Dynamic Salt

Jin-Ho Jeong and Young-Wook Cha

Journal: The Journal of Korean Institute of Information Technology, 2020, Volume 18, Number 9, Page 89

Read Online

Conference Paper

Practical Decryption exFiltration

Jens Müller, Fabian Ising, Vladislav Mladenov, Christian Mainka, Sebastian Schinzel and Jörg Schwenk

Conference: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, Year: 2019, Page 15

Read Online

Conference Paper

Modeling techniques for logic locking

Joseph Sweeney, Marijn J. H. Heule and Lawrence Pileggi

Conference: Proceedings of the 39th International Conference on Computer-Aided Design, Year: 2020, Page 1

Read Online

citation rank

99th
percentile

Citations per year

20172024

citing journals

See More

citing books

See More
See Less