dx.doi.org/10.1007/11935230_1
Preview meta tags from the dx.doi.org website.
Linked Hostnames
21- 19 links tolink.springer.com
- 16 links toscholar.google.com
- 12 links todx.doi.org
- 10 links towww.springernature.com
- 4 links tocitation-needed.springer.com
- 2 links toscholar.google.co.uk
- 2 links tosupport.springernature.com
- 2 links towww.ncbi.nlm.nih.gov
Thumbnail
Search Engine Appearance
Finding SHA-1 Characteristics: General Results and Applications
The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way. This is...
Bing
Finding SHA-1 Characteristics: General Results and Applications
The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way. This is...
DuckDuckGo
Finding SHA-1 Characteristics: General Results and Applications
The most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way. This is...
General Meta Tags
37- titleFinding SHA-1 Characteristics: General Results and Applications | SpringerLink
- charsetUTF-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1
- applicable-devicepc,mobile
Open Graph Meta Tags
6- og:urlhttps://link.springer.com/chapter/10.1007/11935230_1
- og:typePaper
- og:site_nameSpringerLink
- og:titleFinding SHA-1 Characteristics: General Results and Applications
- og:descriptionThe most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way. This is...
Twitter Meta Tags
6- twitter:siteSpringerLink
- twitter:cardsummary
- twitter:image:altContent cover image
- twitter:titleFinding SHA-1 Characteristics: General Results and Applications
- twitter:descriptionThe most efficient collision attacks on members of the SHA family presented so far all use complex characteristics which were manually constructed by Wang et al. In this report, we describe a method to search for characteristics in an automatic way. This is...
Item Prop Meta Tags
3- position1
- position2
- position3
Link Tags
9- apple-touch-icon/oscar-static/img/favicons/darwin/apple-touch-icon-92e819bf8a.png
- canonicalhttps://link.springer.com/chapter/10.1007/11935230_1
- icon/oscar-static/img/favicons/darwin/android-chrome-192x192-6f081ca7e5.png
- icon/oscar-static/img/favicons/darwin/favicon-32x32-1435da3e82.png
- icon/oscar-static/img/favicons/darwin/favicon-16x16-ed57f42bd2.png
Links
81- http://citations.springer.com/item?doi=10.1007/11935230_1
- http://eprint.iacr.org
- http://scholar.google.co.uk/scholar?as_q=&num=10&btnG=Search+Scholar&as_epq=&as_oq=&as_eq=&as_occt=any&as_sauthors=%22Christian%20Rechberger%22&as_publication=&as_ylo=&as_yhi=&as_allsubj=all&hl=en
- http://scholar.google.co.uk/scholar?as_q=&num=10&btnG=Search+Scholar&as_epq=&as_oq=&as_eq=&as_occt=any&as_sauthors=%22Christophe%20De%20Canni%C3%A8re%22&as_publication=&as_ylo=&as_yhi=&as_allsubj=all&hl=en
- http://www.itl.nist.gov/fipspubs