SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Shu-Sheng Liu, Zheng Gong, Li-Bin Wang. Cryptanalysis of Reduced-Round DASH[J]. Journal of Computer Science and Technology, 2013, 28(1): 159-164. DOI: 10.1007/s11390-013-1320-x |
[1] |
Wang X Y, Lai X J, Feng D G, Chen H, Yu X Y. Cryptanalysisof the hash functions MD4 and RIPEMD. In Proc. the24th EUROCRYPT 2005, May 2005, pp.1-18.
|
[2] |
Wang X Y, Yin Y L, Yu H B. Finding collisions in the fullSHA-1. In Proc. the 25th CRYPTO 2005, August 2005,pp.17-36.
|
[3] |
Wang X Y, Yu H B. How to break MD5 and other hash functions.In Proc. the 24th EUROCRYPT 2005, May 2005,pp.19-35.
|
[4] |
Wang X Y, Yu H B, Yin Y L. Efficient collision search attackson SHA-0. In Proc. the 25th CRYPTO 2005, August 2005,pp.1-16.
|
[5] |
Billet O, Robshaw M J B, Seurin Y, Yin Y L. Looking backat a new hash function. In Proc. the 13th ACISP 2008, July2008, pp.239-253.
|
[6] |
National Institute of Standards and Technology(NIST). Advanced encryption standard (AES).http://csrc.nist.gov/publications/fips197/fips-197.pdf.
|
[7] |
Rivest R L, Robshaw M J B, Sidney R, Yin Y L.The RC6TM block cipher (V1.1), August 20, 1998,www.people.csail.mit.edu/rivest/pubs/RRSY98.pdf.
|
[8] |
Wagner D. The Boomerang attack. In Proc. the 6th FSE,March 1999, pp.156-170.
|
[9] |
Biryukov A, Nikolic I, Roy A. Boomerang attacks on BLAKE-32. In Proc. the 18th FSE, February 2011, pp.218-237.
|
[10] |
Lamberger M, Mendel F. Higher-order differential attackon reduced SHA-256. Cryptology ePrint Archive, Report2011/037, 2011, http://eprint.iacr.org/2011/037.
|
[1] | Yuan Yao, Bin Zhang, Wen-Ling Wu. Utilizing Probabilistic Linear Equations in Cube Attacks[J]. Journal of Computer Science and Technology, 2016, 31(2): 317-325. DOI: 10.1007/s11390-016-1629-3 |
[2] | Long Wen, Mei-Qin Wang, Jing-Yuan Zhao. Related-Key Impossible Differential Attack on Reduced-Round Lblock[J]. Journal of Computer Science and Technology, 2014, 29(1): 165-176. DOI: 10.1007/s11390-013-1419-0 |
[3] | Gao-Li Wang. Collision Attack on the Full Extended MD4 and Pseudo-Preimage Attack on RIPEMD[J]. Journal of Computer Science and Technology, 2013, 28(1): 129-143. DOI: 10.1007/s11390-013-1317-5 |
[4] | Fu-Guo Zhang. Preventing Recommendation Attack in Trust-Based Recommender Systems[J]. Journal of Computer Science and Technology, 2011, 26(5): 823-828. DOI: 10.1007/s11390-011-0181-4 |
[5] | Hamid Mala, Mohammad Dakhilalian, Mohsen Shakiba. Impossible Differential Attacks on 13-Round CLEFIA-128[J]. Journal of Computer Science and Technology, 2011, 26(4): 744-750. DOI: 10.1007/s11390-011-1173-0 |
[6] | Ji-Qiang Lv. Differential Attack on Five Rounds of the SC2000 Block Cipher[J]. Journal of Computer Science and Technology, 2011, 26(4): 722-731. DOI: 10.1007/s11390-011-1171-2 |
[7] | Ya-Fei Yang, Qin-Yuan Feng, Yan (Lindsay) Sun, Ya-Fei Dai. Dishonest Behaviors in Online Rating Systems: Cyber Competition, Attack Models, and Attack Generator[J]. Journal of Computer Science and Technology, 2009, 24(5): 855-867. |
[8] | Wen-Ling Wu, Wen-Tao Zhang, Deng-Guo Feng. Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia[J]. Journal of Computer Science and Technology, 2007, 22(3): 449-456. |
[9] | Jie Liang, Xue-Jia Lai. Improved Collision Attack on Hash Function MD5[J]. Journal of Computer Science and Technology, 2007, 22(1): 79-87. |
[10] | XU Ke, WU Jianping, YU Zhongchao, XU Mingwei. A Non-Collision Hash Trie-Tree Based Fast IP Classification Algorithm[J]. Journal of Computer Science and Technology, 2002, 17(2). |
1. | Keming Huang, Mingwei Li, Jiaqi Song, et al. Layered centrality tournament ranking: To rank nodes in multilayer networks. International Journal of Modern Physics C, 2025. DOI:10.1142/S0129183125500445 |
2. | Zeang Sheng, Wentao Zhang, Yangyu Tao, et al. OUTRE: An OUT-of-Core De-REdundancy GNN Training Framework for Massive Graphs within A Single Machine. Proceedings of the VLDB Endowment, 2024, 17(11): 2960. DOI:10.14778/3681954.3681976 |
3. | Bilal Abu-Salih, Salihah Alotaibi. Knowledge Graph Construction for Social Customer Advocacy in Online Customer Engagement. Technologies, 2023, 11(5): 123. DOI:10.3390/technologies11050123 |
4. | Dong Wu. Digital Media Information Recommendation Model based on Artificial Intelligence Technology. 2024 International Conference on Distributed Computing and Optimization Techniques (ICDCOT), DOI:10.1109/ICDCOT61034.2024.10515981 |
5. | Muder Almiani, Bilal Abu-Salih, Salihah Alotaibi, et al. Knowledge Graph Embedding for Detecting Brand Advocates in Online Social Networks. 2024 Fifth International Conference on Intelligent Data Science Technologies and Applications (IDSTA), DOI:10.1109/IDSTA62194.2024.10747006 |