-
1
-
-
84947913130
-
Generating ElGamal signatures without knowing the secret key
-
EuroCrypt '96, Springer Verlag
-
D. Bleichenbacher, Generating ElGamal signatures without knowing the secret key, EuroCrypt '96, LNCS vol. 1070, Springer Verlag, pp. 10-18, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 10-18
-
-
Bleichenbacher, D.1
-
2
-
-
0347546204
-
Alf swindles Ann
-
Hans Dobbertin, Alf swindles Ann, Cryptobytes 1(3) (1995), p. 5.
-
(1995)
Cryptobytes
, vol.1
, Issue.3
, pp. 5
-
-
Dobbertin, H.1
-
5
-
-
26444456237
-
-
"cryptography@metzdowd.com", December 22
-
J. Kelsey, B. Laurie, Contributions to the mailing list "cryptography@metzdowd.com", December 22, 2004, available at http://diswww.mit.edu/bloom-picayune/crypto/16587.
-
(2004)
Contributions to the Mailing List
-
-
Kelsey, J.1
Laurie, B.2
-
6
-
-
84947730183
-
Generating RSA moduli with a predetermined portion
-
Asiacrypt'98
-
A.K. Lenstra, Generating RSA moduli with a predetermined portion, Asiacrypt'98, Springer-Verlag LNCS 1514 (1998), 1-10.
-
(1998)
Springer-Verlag LNCS
, vol.1514
, pp. 1-10
-
-
Lenstra, A.K.1
-
11
-
-
26444489262
-
Collisions for SHAO, MD5, HAVAL, MD4, and RIPEMD, but SHA1 still secure
-
J. Randall, M. Szydlo, Collisions for SHAO, MD5, HAVAL, MD4, and RIPEMD, but SHA1 still secure, RSA Laboratories technical notes, http://www.rsasecurity. com/rsalabs/node.asp?id=2738.
-
RSA Laboratories Technical Notes
-
-
Randall, J.1
Szydlo, M.2
-
12
-
-
26444479881
-
What's the worst that could happen?
-
October 14-15
-
E. Rescorla, What's the Worst That Could Happen? presentation at the DIMACS Workshop on Cryptography: Theory Meets Practice October 14-15, 2004, http://dimacs.rutgers.edu/Workshops/Practice/slides/rescorla.pdf.
-
(2004)
DIMACS Workshop on Cryptography: Theory Meets Practice
-
-
Rescorla, E.1
-
14
-
-
19944425657
-
-
eprint archive 2004/199, 2004/199, presented at the Crypto 2004 rump session, August 17
-
X. Wang, D. Feng, X. Lai, H. Yu, Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD, eprint archive 2004/199, http://eprint.iacr.org/ 2004/199, presented at the Crypto 2004 rump session, August 17, 2004.
-
(2004)
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMD
-
-
Wang, X.1
Feng, D.2
Lai, X.3
Yu, H.4
-
15
-
-
24944591357
-
How to break MD5 and other hash functions
-
EuroCrypt 2005
-
X. Wang and H. Yu , How to Break MD5 and Other Hash Functions, EuroCrypt 2005, Springer LNCS 3494 (2005), 19-35.
-
(2005)
Springer LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
16
-
-
24944575304
-
Cryptanalysis of the hash functions MD4 and RIPEMD
-
EuroCrypt 2005
-
X. Wang, X. Lai, D. Feng, H. Chen and X. Yu, Cryptanalysis of the Hash Functions MD4 and RIPEMD, EuroCrypt 2005, Springer LNCS 3494 (2005), 1-18.
-
(2005)
Springer LNCS
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
18
-
-
26444573353
-
An attack on hash function HAVAL-128
-
X. Wang, D. Feng, X. Yu, An Attack on Hash Function HAVAL-128 (Chinese), Science in China Ser. F (Information Sciences) 35(4) (2005), 405-416.
-
(2005)
Science in China Ser. F (Information Sciences)
, vol.35
, Issue.4
, pp. 405-416
-
-
Wang, X.1
Feng, D.2
Yu, X.3
-
19
-
-
26444605979
-
-
personal communication, November 17
-
M. Wiener, personal communication, November 17, 2004.
-
(2004)
-
-
Wiener, M.1
|