dx.doi.org/10.1007/11935230_1

Preview meta tags from the dx.doi.org website.

Linked Hostnames

21

Thumbnail

Search Engine Appearance

Google

https://dx.doi.org/10.1007/11935230_1

Finding SHA-1 Characteristics: General Results and Applications

The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way. This is...



Bing

Finding SHA-1 Characteristics: General Results and Applications

https://dx.doi.org/10.1007/11935230_1

The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way. This is...



DuckDuckGo

https://dx.doi.org/10.1007/11935230_1

Finding SHA-1 Characteristics: General Results and Applications

The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way. This is...

  • General Meta Tags

    37
    • title
      Finding SHA-1 Characteristics: General Results and Applications | SpringerLink
    • charset
      UTF-8
    • X-UA-Compatible
      IE=edge
    • viewport
      width=device-width, initial-scale=1
    • applicable-device
      pc,mobile
  • Open Graph Meta Tags

    6
    • og:url
      https://link.springer.com/chapter/10.1007/11935230_1
    • og:type
      Paper
    • og:site_name
      SpringerLink
    • og:title
      Finding SHA-1 Characteristics: General Results and Applications
    • og:description
      The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way. This is...
  • Twitter Meta Tags

    6
    • twitter:site
      SpringerLink
    • twitter:card
      summary
    • twitter:image:alt
      Content cover image
    • twitter:title
      Finding SHA-1 Characteristics: General Results and Applications
    • twitter:description
      The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way. This is...
  • Item Prop Meta Tags

    3
    • position
      1
    • position
      2
    • position
      3
  • Link Tags

    9
    • apple-touch-icon
      /oscar-static/img/favicons/darwin/apple-touch-icon-92e819bf8a.png
    • canonical
      https://link.springer.com/chapter/10.1007/11935230_1
    • icon
      /oscar-static/img/favicons/darwin/android-chrome-192x192-6f081ca7e5.png
    • icon
      /oscar-static/img/favicons/darwin/favicon-32x32-1435da3e82.png
    • icon
      /oscar-static/img/favicons/darwin/favicon-16x16-ed57f42bd2.png

Links

81