-
1
-
-
24944584156
-
Collisions of SHA-0 and reduced SHA-1
-
Eurocrypt 2005
-
E. Biham, R. Chen, A. Joux, P. Carribault, C. Lemuet, W. Jalby. Collisions of SHA-0 and reduced SHA-1. Eurocrypt 2005, LNCS 3494, 36-57.
-
LNCS
, vol.3494
, pp. 36-57
-
-
Biham, E.1
Chen, R.2
Joux, A.3
Carribault, P.4
Lemuet, C.5
Jalby, W.6
-
2
-
-
50449107349
-
Black-box analysis of the block-cipher based hash-function construction from PGV
-
Crypto 02
-
J. Black, P. Rogaway, T. Shrimpton, Black-box analysis of the block-cipher based hash-function construction from PGV. Crypto 02, LNCS 2442, 320-335.
-
LNCS
, vol.2442
, pp. 320-335
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
3
-
-
84957808681
-
Design validation for discrete logarithm based signature schemes
-
PKC 2000
-
E. Brickell, D. Pointcheval, S. Vaudenay, M. Yung. Design validation for discrete logarithm based signature schemes. PKC 2000, LNCS 1751, 276-292
-
LNCS
, vol.1751
, pp. 276-292
-
-
Brickell, E.1
Pointcheval, D.2
Vaudenay, S.3
Yung, M.4
-
6
-
-
84981199109
-
A design principle for hash functions
-
Crypto 89
-
I. Damgård. A design principle for hash functions. Crypto 89, LNCS 435, 416-427.
-
LNCS
, vol.435
, pp. 416-427
-
-
Damgård, I.1
-
7
-
-
84888819057
-
The story of Alice and her boss
-
rump session
-
M. Daum, S. Lucks. The story of Alice and her boss. Eurocrypt 05 rump session, http://th.informatik.uni-mannheim.de/people/lucks/HashCollisions/
-
Eurocrypt 05
-
-
Daum, M.1
Lucks, S.2
-
8
-
-
84958957924
-
RIPEMD-160, a strengthened version of RIPEMD
-
FSE 1996
-
H. Dobbertin, A. Bosselaers, B. Preneel, RIPEMD-160, a strengthened version of RIPEMD. FSE 1996, LNCS 1039, 71-82.
-
LNCS
, vol.1039
, pp. 71-82
-
-
Dobbertin, H.1
Bosselaers, A.2
Preneel, B.3
-
9
-
-
33646801513
-
-
See also http://www.esat.kuleuven.ac.be/bosselae/ripemd160.html
-
-
-
-
11
-
-
84955562814
-
On the length of cryptographic hash-values used in identification schemes
-
Crypto 94
-
M. Girault, J. Stern. On the length of cryptographic hash-values used in identification schemes. Crypto 94, LNCS 839, 202-215
-
LNCS
, vol.839
, pp. 202-215
-
-
Girault, M.1
Stern, J.2
-
12
-
-
33645780237
-
Multicollisions in iterated hash functions, application to cascaded constructions
-
Crypto 04
-
A. Joux. Multicollisions in iterated hash functions, application to cascaded constructions. Crypto 04, LNCS 3152, 306-316.
-
LNCS
, vol.3152
, pp. 306-316
-
-
Joux, A.1
-
15
-
-
33646803364
-
On the possibility of constructing meaningful hash collisions for public keys
-
To appear
-
A. Lenstra, B. de Weger. On the possibility of constructing meaningful hash collisions for public keys, To appear at ACISP 2005.
-
ACISP 2005
-
-
Lenstra, A.1
De Weger, B.2
-
17
-
-
84937461306
-
One-way hash functions and des
-
Crypto 89
-
R. Merkle. One-way hash functions and DES. Crypto 89, LNCS 435, 428-446.
-
LNCS
, vol.435
, pp. 428-446
-
-
Merkle, R.1
-
18
-
-
85018212721
-
Practical attacks on digital signatures using MD5 message digest
-
O. Mikle. Practical attacks on digital signatures using MD5 message digest. Cryptology eprint archive report 2004/356. http://eprint.iacr.org/2004/ 356/
-
Cryptology ePrint Archive Report
, vol.2004
, Issue.356
-
-
Mikle, O.1
-
19
-
-
26444539878
-
Security analysis of a 2/3-rate double length compression function in the black box model
-
FSE 2005
-
M. Nandi, W. Lee, K. Sakurai, S. Lee. Security analysis of a 2/3-rate double length compression function in the black box model. FSE 2005, LNCS 3557, 243-254.
-
LNCS
, vol.3557
, pp. 243-254
-
-
Nandi, M.1
Lee, W.2
Sakurai, K.3
Lee, S.4
-
20
-
-
8344253818
-
-
FIPS 180-2. August
-
National Institute of Standards and Technology (NIST). Secure hash standard. FIPS 180-2. August 2002.
-
(2002)
Secure Hash Standard
-
-
-
23
-
-
5644280926
-
RIPE integrity primitives for secure information systems. Final report of RACE integrity primitives evaluation (RIPE RACE 1040)
-
RIPE integrity primitives for secure information systems. Final report of RACE integrity primitives evaluation (RIPE RACE 1040). LNCS 1007, 1995.
-
(1995)
LNCS
, vol.1007
-
-
-
24
-
-
0001797564
-
PayWord and MicroMint - Two simple micropayment schemes
-
R. Rivest, A. Shamir. PayWord and MicroMint - two simple micropayment schemes. CryptoBytes, Vol. 2, # 1 (1996), 7-11.
-
(1996)
CryptoBytes
, vol.2
, Issue.1
, pp. 7-11
-
-
Rivest, R.1
Shamir, A.2
-
25
-
-
35048855067
-
Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision-resistance
-
FSE 2004
-
P. Rogaway and T. Shrimpton. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision-Resistance. FSE 2004, LNCS 3017, 371-388.
-
LNCS
, vol.3017
, pp. 371-388
-
-
Rogaway, P.1
Shrimpton, T.2
-
26
-
-
24944575304
-
Cryptoanalyisis of the hash functions MD4 and RIPEMD
-
Eurocrypt 2005
-
X. Wang, X. Lai, D. Feng, H. Cheng, X. Yu. Cryptoanalyisis of the hash functions MD4 and RIPEMD. Eurocrypt 2005, LNCS 3494, 1-18.
-
LNCS
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Cheng, H.4
Yu, X.5
-
27
-
-
24944591357
-
How to break MD5 and other hash functions
-
Eurocrypt 2005
-
X. Wang, H. Yu. How to break MD5 and other hash functions. Eurocrypt 2005, LNCS 3494, 19-35.
-
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
28
-
-
33646748234
-
Efficient collision search attacks on SHAO
-
Accepted for
-
X. Wang, H. Yu, Y. L. Yin. Efficient collision search attacks on SHAO. Accepted for Crypto 2005.
-
Crypto 2005
-
-
Wang, X.1
Yu, H.2
Yin, Y.L.3
-
29
-
-
33646754186
-
Finding collisions in the full SHA1
-
Accepted for
-
X. Wang, Y. L. Yin, H. Yu, Finding collisions in the full SHA1. Accepted for Crypto 2005.
-
Crypto 2005
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
|