Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
3
views
27
references
Top references
cited by
2
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,498
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Algorithms and Architectures for Parallel Processing : 17th International Conference, ICA3PP 2017, Helsinki, Finland, August 21-23, 2017, Proceedings
From Collisions to Chosen-Prefix Collisions Application to Full SHA-1
other
Author(s):
Gaëtan Leurent
,
Thomas Peyrin
Publication date
(Online):
April 24 2019
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
UCL: UN SDG 01 No Poverty
Most cited references
27
Record
: found
Abstract
: not found
Report
: not found
The MD5 Message-Digest Algorithm
R. Rivest
(1992)
0
comments
Cited
164
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
How to Break MD5 and Other Hash Functions
Xiaoyun Wang
,
Hongbo Yu
(2005)
0
comments
Cited
76
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
A Design Principle for Hash Functions
Ivan Damgard
(1990)
0
comments
Cited
72
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2019
Publication date (Online):
April 24 2019
Pages
: 527-555
DOI:
10.1007/978-3-030-17659-4_18
SO-VID:
db33c061-06a6-4dc1-a50d-14dba9947a54
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. C1
Correction to: Acceleration of High-Resolution 3D MR Fingerprinting via a Graph Convolutional Network
pp. E1
Erratum to: A Brain Network Inspired Algorithm: Pre-trained Extreme Learning Machine
pp. 3
On ELFs, Deterministic Encryption, and Correlated-Input Security
pp. 3
Low-Rank and Sparse Matrix Completion for Recommendation
pp. 3
Improving Amide Proton Transfer-Weighted MRI Reconstruction Using T2-Weighted Images
pp. 13
Compressive MR Fingerprinting Reconstruction with Neural Proximal Gradient Iterations
pp. 14
A Brain Network Inspired Algorithm: Pre-trained Extreme Learning Machine
pp. 23
Active MR k-space Sampling with Reinforcement Learning
pp. 24
K-Hop Community Search Based on Local Distance Dynamics
pp. 33
New Techniques for Efficient Trapdoor Functions and Applications
pp. 34
Fast Correction of Eddy-Current and Susceptibility-Induced Distortions Using Rotation-Invariant Contrasts
pp. 35
An Improved Feedback Wavelet Neural Network for Short-Term Passenger Entrance Flow Prediction in Shanghai Subway System
pp. 44
Joint Reconstruction and Bias Field Correction for Undersampled MR Imaging
pp. 46
Social and Content Based Collaborative Filtering for Point-of-Interest Recommendations
pp. 53
Joint Total Variation ESTATICS for Robust Multi-parameter Mapping
pp. 57
Modeling Server Workloads for Campus Email Traffic Using Recurrent Neural Networks
pp. 64
Symbolic Encryption with Pseudorandom Keys
pp. 64
End-to-End Variational Networks for Accelerated MRI Reconstruction
pp. 67
Multiclass Imbalanced Classification Using Fuzzy C-Mean and SMOTE with Fuzzy Support Vector Machine
pp. 74
3d-SMRnet: Achieving a New Quality of MPI System Matrix Recovery by Deep Learning
pp. 76
Incremental Matrix Reordering for Similarity-Based Dynamic Data Sets
pp. 83
MRI Image Reconstruction via Learning Optimization Using Neural ODEs
pp. 85
Power Consumption Prediction for Dynamic Adjustment in Hydrocracking Process Based on State Transition Algorithm and Support Vector Machine
pp. 94
An Evolutionary Framework for Microstructure-Sensitive Generalized Diffusion Gradient Waveforms
pp. 95
Learning with Partially Shared Features for Multi-Task Learning
pp. 97
Covert Security with Public Verifiability: Faster, Leaner, and Simpler
pp. 104
Lesion Mask-Based Simultaneous Synthesis of Anatomic and Molecular MR Images Using a GAN
pp. 105
Power Users Behavior Analysis and Application Based on Large Data
pp. 114
T2 Mapping from Super-Resolution-Reconstructed Clinical Fast Spin Echo Magnetic Resonance Acquisitions
pp. 115
Accelerated Matrix Factorisation Method for Fuzzy Clustering
pp. 122
Efficient Circuit-Based PSI with Linear Communication
pp. 124
Mining Mobile Phone Base Station Data Based on Clustering Algorithms with Application to Public Traffic Route Design
pp. 125
Learned Proximal Networks for Quantitative Susceptibility Mapping
pp. 134
Extracting Deep Semantic Information for Intelligent Recommendation
pp. 136
Learning a Gradient Guidance for Spatially Isotropic MRI Super-Resolution Reconstruction
pp. 145
A Hybrid Method of Sine Cosine Algorithm and Differential Evolution for Feature Selection
pp. 147
Encoding Metal Mask Projection for Metal Artifact Reduction in Computed Tomography
pp. 154
An Algebraic Approach to Maliciously Secure Private Set Intersection
pp. 156
Feature Selection Based on Improved Runner-Root Algorithm Using Chaotic Singer Map and Opposition-Based Learning
pp. 158
Acceleration of High-Resolution 3D MR Fingerprinting via a Graph Convolutional Network
pp. 167
Deep Attentive Wasserstein Generative Adversarial Networks for MRI Reconstruction with Recurrent Context-Awareness
pp. 167
LWMC: A Locally Weighted Meta-Clustering Algorithm for Ensemble Clustering
pp. 177
PUD: Social Spammer Detection Based on PU Learning
pp. 178
Learning MRI k-Space Subsampling Pattern Using Progressive Weight Pruning
pp. 186
Discovery of Interconnection Among Knowledge Areas of Standard Computer Science Curricula by a Data Science Approach
pp. 188
Model-Driven Deep Attention Network for Ultra-fast Compressive Sensing MRI Guided by Cross-contrast MR Image
pp. 189
On Finding Quantum Multi-collisions
pp. 196
A Probabilistic Model for the Cold-Start Problem in Rating Prediction Using Click Data
pp. 199
Simultaneous Estimation of X-Ray Back-Scatter and Forward-Scatter Using Multi-task Learning
pp. 206
Dynamic Forest Model for Sentiment Classification
pp. 211
MIA-Prognosis: A Deep Learning Framework to Predict Therapy Response
pp. 216
A Multi-attention-Based Bidirectional Long Short-Term Memory Network for Relation Extraction
pp. 219
On Quantum Advantage in Information Theoretic Single-Server PIR
pp. 221
\(\text {M}^2\text {Net}\): Multi-modal Multi-channel Network for Overall Survival Time Prediction of Brain Tumor Patients
pp. 228
Question Recommendation in Medical Community-Based Question Answering
pp. 232
Automatic Detection of Free Intra-abdominal Air in Computed Tomography
pp. 237
A Visual Analysis of Changes to Weighted Self-Organizing Map Patterns
pp. 242
Prediction of Pathological Complete Response to Neoadjuvant Chemotherapy in Breast Cancer Using Deep Learning with Integrative Imaging, Molecular and Demographic Data
pp. 247
Verifier-on-a-Leash: New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear Resources
pp. 247
Periodic Associated Sensor Patterns Mining from Wireless Sensor Networks
pp. 253
Geodesically Smoothed Tensor Features for Pulmonary Hypertension Prognosis Using the Heart and Surrounding Tissues
pp. 256
Online Multi-label Passive Aggressive Active Learning Algorithm Based on Binary Relevance
pp. 263
Ovarian Cancer Prediction in Proteomic Data Using Stacked Asymmetric Convolution
pp. 267
Predicting Taxi Passenger Demands Based on the Temporal and Spatial Information
pp. 272
DeepPrognosis: Preoperative Prediction of Pancreatic Cancer Survival and Surgical Margin via Contrast-Enhanced CT Imaging
pp. 275
Combining the Global and Local Estimation Models for Predicting PM \(_{10}\) Concentrations
pp. 281
Ring Signatures: Logarithmic-Size, No Setup—from Standard Assumptions
pp. 283
Holistic Analysis of Abdominal CT for Predicting the Grade of Dysplasia of Pancreatic Lesions
pp. 285
Anomaly Detection for Categorical Observations Using Latent Gaussian Process
pp. 294
Feature-Enhanced Graph Networks for Genetic Mutational Prediction Using Histopathological Images in Colon Cancer
pp. 297
Make Users and Preferred Items Closer: Recommendation via Distance Metric Learning
pp. 305
Spatial-And-Context Aware (SpACe) “Virtual Biopsy” Radiogenomic Maps to Target Tumor Mutational Status on Structural MRI
pp. 306
Deep Bi-directional Long Short-Term Memory Model for Short-Term Traffic Flow Prediction
pp. 312
Group Signatures Without NIZK: From Lattices in the Standard Model
pp. 315
CorrSigNet: Learning CORRelated Prostate Cancer SIGnatures from Radiology and Pathology Images for Improved Computer Aided Diagnosis
pp. 317
Odor Change of Citrus Juice During Storage Based on Electronic Nose Technology
pp. 326
Preoperative Prediction of Lymph Node Metastasis from Clinical DCE MRI of the Primary Breast Tumor Using a 4D CNN
pp. 327
A Tag-Based Integrated Diffusion Model for Personalized Location Recommendation
pp. 335
Learning Differential Diagnosis of Skin Conditions with Co-occurrence Supervision Using Graph Convolutional Networks
pp. 338
Relationship Measurement Using Multiple Factors Extracted from Merged Meeting Events
pp. 345
A Modular Treatment of Blind Signatures from Identification Schemes
pp. 347
Unified Cross-Modality Feature Disentangler for Unsupervised Multi-domain MRI Abdomen Organs Segmentation
pp. 348
Reinforcement Label Propagation Algorithm Based on History Record
pp. 357
A Hybrid Approach for Recovering Information Propagational Direction
pp. 359
Dynamic Memory to Alleviate Catastrophic Forgetting in Continuous Learning Settings
pp. 368
Geo-Pairwise Ranking Matrix Factorization Model for Point-of-Interest Recommendation
pp. 369
Unlearning Scanner Bias for MRI Harmonisation
pp. 378
A Method to Improve Accuracy of Velocity Prediction Using Markov Model
pp. 379
Efficient Verifiable Delay Functions
pp. 379
Cross-domain Medical Image Translation by Shared Latent Gaussian Mixture Model
pp. 387
Strength Analysis on Safety-Belt ISOFIX Anchorage for Vehicles Based on HyperWorks and Ls-Dyna
pp. 390
Self-supervised Skull Reconstruction in Brain CT Images with Decompressive Craniectomy
pp. 397
Robust Adaptive Beamforming in Uniform Circular Array
pp. 400
X2Teeth: 3D Teeth Reconstruction from a Single Panoramic Radiograph
pp. 407
Evaluating Accuracy in Prudence Analysis for Cyber Security
pp. 408
Quantum Lightning Never Strikes the Same State Twice
pp. 410
Domain Adaptation for Ultrasound Beamforming
pp. 418
A Bayesian Posterior Updating Algorithm in Reinforcement Learning
pp. 421
CDF-Net: Cross-Domain Fusion Network for Accelerated MRI Reconstruction
pp. 427
Detecting Black IP Using for Classification and Analysis Through Source IP of Daily Darknet Traffic
pp. 433
Improve Unseen Domain Generalization via Enhanced Local Color Transformation
pp. 434
A Linear Online Guided Policy Search Algorithm
pp. 441
Secret-Sharing Schemes for General and Uniform Access Structures
pp. 442
Detection of Botnet Activities Through the Lens of a Large-Scale Darknet
pp. 444
Transport-Based Joint Distribution Alignment for Multi-site Autism Spectrum Disorder Diagnosis Using Resting-State fMRI
pp. 454
Automatic and Interpretable Model for Periodontitis Diagnosis in Panoramic Radiographs
pp. 455
An Altered Kernel Transformation for Time Series Classification
pp. 464
Residual-CycleGAN Based Camera Adaptation for Robust Diabetic Retinopathy Screening
pp. 466
An Interweaved Time Series Locally Connected Recurrent Neural Network Model on Crime Forecasting
pp. 472
Towards Optimal Robust Secret Sharing with Security Against a Rushing Adversary
pp. 475
Shape-Aware Meta-learning for Generalizing Prostate MRI Segmentation to Unseen Domains
pp. 475
Decouple Adversarial Capacities with Dual-Reservoir Network
pp. 484
Tree Factored Conditional Restricted Boltzmann Machines for Mixed Motion Style
pp. 486
Automatic Plane Adjustment of Orthopedic Intraoperative Flat Panel Detector CT-Volumes
pp. 493
A Piecewise Hybrid of ARIMA and SVMs for Short-Term Traffic Flow Prediction
pp. 496
Unsupervised Graph Domain Adaptation for Neurodevelopmental Disorders Diagnosis
pp. 500
Simple Schemes in the Bounded Storage Model
pp. 503
TMRCP: A Trend-Matching Resources Coupled Prediction Method over Data Stream
pp. 506
JBFnet - Low Dose CT Denoising by Trainable Joint Bilateral Filtering
pp. 514
App Uninstalls Prediction: A Machine Learning and Time Series Mining Approach
pp. 516
MI\(^2\)GAN: Generative Adversarial Network for Medical Image Domain Adaptation Using Mutual Information Constraint
pp. 523
Time Series Forecasting Using GRU Neural Network with Multi-lag After Decomposition
pp. 527
From Collisions to Chosen-Prefix Collisions Application to Full SHA-1
pp. 529
Joint Modeling of Chest Radiographs and Radiology Reports for Pulmonary Edema Assessment
pp. 533
Position-Based Content Attention for Time Series Forecasting with Sequence-to-Sequence RNNs
pp. 540
Domain-Specific Loss Design for Unsupervised Physical Training: A New Approach to Modeling Medical ML Solutions
pp. 545
Deep Sequence-to-Sequence Neural Networks for Ionospheric Activity Map Prediction
pp. 551
Multiatlas Calibration of Biophysical Brain Tumor Growth Models with Mass Effect
pp. 556
Preimage Attacks on Round-Reduced Keccak-224/256 via an Allocating Approach
pp. 556
Spatio-Temporal Wind Power Prediction Using Recurrent Neural Networks
pp. 561
Chest X-Ray Report Generation Through Fine-Grained Label Learning
pp. 564
Bayesian Neural Learning via Langevin Dynamics for Chaotic Time Series Prediction
pp. 572
Peri-Diagnostic Decision Support Through Cost-Efficient Feature Acquisition at Test-Time
pp. 574
Causality Analysis Between Soil of Different Depth Moisture and Precipitation in the United States
pp. 581
Fix-Budget and Recurrent Data Mining for Online Haptic Perception
pp. 582
A Deep Bayesian Video Analysis Framework: Towards a More Robust Estimation of Ejection Fraction
pp. 585
bison Instantiating the Whitened Swap-Or-Not Construction
pp. 591
Distractor-Aware Neuron Intrinsic Learning for Generic 2D Medical Image Classifications
pp. 592
Arterial Coordination for Dedicated Bus Priority Based on a Spectral Clustering Algorithm
pp. 600
Multi-resolution Selective Ensemble Extreme Learning Machine for Electricity Consumption Prediction
pp. 602
Large-Scale Inference of Liver Fat with Neural Networks on UK Biobank Body MRI
pp. 610
Dow Jones Index is Driven Periodically by the Unemployment Rate During Economic Crisis and Non-economic Crisis Periods
pp. 612
BUNET: Blind Medical Image Segmentation Based on Secure UNET
pp. 618
Dynamic Cyclone Wind-Intensity Prediction Using Co-Evolutionary Multi-task Learning
pp. 619
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing
pp. 623
Temporal-Consistent Segmentation of Echocardiography with Co-learning from Appearance and Shape
pp. 631
Layer-Prioritized Influence Maximization in Social Networks
pp. 633
Decision Support for Intoxication Prediction Using Graph Convolutional Networks
pp. 636
New Techniques for Obfuscating Conjunctions
pp. 639
Design of Traffic Signal Controller Based on Network
pp. 643
Latent-Graph Learning for Disease Prediction
pp. 647
Motif Iteration Model for Network Representation
pp. 657
BR-GAN: Bilateral Residual Generating Adversarial Network for Mammogram Classification
pp. 657
Inferring Social Network User’s Interest Based on Convolutional Neural Network
pp. 667
Cycle Structure and Illumination Constrained GAN for Medical Image Enhancement
pp. 667
Enhanced Deep Learning Models for Sentiment Analysis in Arab Social Media
pp. 667
Distributional Collision Resistance Beyond One-Way Functions
pp. 677
Collective Actions in Three Types of Continuous Public Goods Games in Spatial Networks
pp. 678
Generating Dual-Energy Subtraction Soft-Tissue Images from Chest Radiographs via Bone Edge-Guided GAN
pp. 688
GANDALF: Generative Adversarial Networks with Discriminator-Adaptive Loss Fine-Tuning for Alzheimer’s Disease Diagnosis from MRI
pp. 689
Analysing the Evolution of Contrary Opinions on a Controversial Network Event
pp. 698
Brain MR to PET Synthesis via Bidirectional Generative Adversarial Network
pp. 699
Multi-target Attacks on the Picnic Signature Scheme and Related Protocols
pp. 699
Category Prediction of Questions Posted in Community-Based Question Answering Services Using Deep Learning Methods
pp. 708
AGAN: An Anatomy Corrector Conditional Generative Adversarial Network
pp. 710
LCE: A Location Category Embedding Model for Predicting the Category Labels of POIs
pp. 718
SteGANomaly: Inhibiting CycleGAN Steganography for Unsupervised Anomaly Detection in Brain MRI
pp. 721
Knowledge Graph Based Question Routing for Community Question Answering
pp. 728
Flow-Based Deformation Guidance for Unpaired Multi-contrast MRI Image-to-Image Translation
pp. 728
Durandal: A Rank Metric Based Signature Scheme
pp. 731
Exploiting Non-visible Relationship in Link Prediction Based on Asymmetric Local Random Walk
pp. 738
Interpretation of Disease Evidence for Medical Images Using Adversarial Deformation Fields
pp. 741
Ciphertext Retrieval Technology of Homomorphic Encryption Based on Cloud Pretreatment
pp. 749
Spatial-Intensity Transform GANs for High Fidelity Medical Image-to-Image Translation
pp. 752
A Linear Time Algorithm for Influence Maximization in Large-Scale Social Networks
pp. 759
SeaSign: Compact Isogeny Signatures from Class Group Actions
pp. 760
Graded Image Generation Using Stratified CycleGAN
pp. 765
Thyroid Nodule Classification Using Hierarchical Recurrent Neural Network with Multiple Ultrasound Reports
pp. 770
Prediction of Plantar Shear Stress Distribution by Conditional GAN with Attention Mechanism
pp. 774
Prediction of Stroke Using Deep Learning Model
pp. 782
A Method of Integrating Spatial Proteomics and Protein-Protein Interaction Network Data
pp. 791
Tuning Hyperparameters for Gene Interaction Models in Genome-Wide Association Studies
pp. 802
Computational Efficacy of GPGPU-Accelerated Simulation for Various Neuron Models
pp. 810
A Haptics Feedback Based-LSTM Predictive Model for Pericardiocentesis Therapy Using Public Introperative Data
pp. 819
Sleep Apnea Event Detection from Nasal Airflow Using Convolutional Neural Networks
pp. 828
A Deep Learning Method to Detect Web Attacks Using a Specially Designed CNN
pp. 837
An Integrated Chaotic System with Application to Image Encryption
pp. 848
Fast, Automatic and Scalable Learning to Detect Android Malware
pp. 858
Intrusion Detection Using Convolutional Neural Networks for Representation Learning
pp. 867
Detect Malicious Attacks from Entire TCP Communication Process
pp. 878
Exploiting Cantor Expansion for Covert Channels over LTE-Advanced
pp. 888
AI Web-Contents Analyzer for Monitoring Underground Marketplace
pp. 897
Towards an Affective Computational Model for Machine Consciousness
pp. 908
Measuring Self-monitoring Using Facebook Online Data Based on Snyder’s Psychological Theories
pp. 919
Coevolution of Cooperation and Complex Networks via Indirect Reciprocity
Similar content
4,498
A Fast Algorithm for Computing Prefix Probabilities
Authors:
Franz Nowak
,
Ryan Cotterell
On Robust Prefix-Tuning for Text Classification
Authors:
Zonghan Yang
,
Yang Liu
The effect of prolonged whole-body cryostimulation treatment with different amounts of sessions on chosen pro- and anti-inflammatory cytokines levels in healthy men.
Authors:
A Lubkowska
,
Z Szyguła
,
D Chlubek
…
See all similar
Cited by
2
Defending Industry 4.0: An Enhanced Authentication Scheme for IoT Devices
Authors:
Nasour Bagheri
,
Saru Kumari
,
Carmen Camara
…
Using a privacy-enhanced authentication process to secure IoT-based smart grid infrastructures
Authors:
Samad Rostampour
,
Nasour Bagheri
,
Behnam Ghavami
…
See all cited by