메뉴 건너뛰기




Volumn 3788 LNCS, Issue , 2005, Pages 462-473

Some attacks against a double length hash proposal

Author keywords

[No Author keywords available]

Indexed keywords

COLLISION ATTACKS; DOUBLE LENGTH HASH PROPOSAL; N-BIT COMPRESSION FUNCTIONS; SECURITY BOUND;

EID: 33646815676     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11593447_25     Document Type: Conference Paper
Times cited : (18)

References (20)
  • 1
    • 35048892549 scopus 로고    scopus 로고
    • Near-collisions of SHA-0
    • M. Franklin, editor, Advances in Cryptology - CRYPTO'04. Springer
    • E. Biham and R. Chen. Near-Collisions of SHA-0. In M. Franklin, editor, Advances in Cryptology - CRYPTO'04, volume 3152 of Lectures Notes in Computer Science, pages 290-305. Springer, 2004.
    • (2004) Lectures Notes in Computer Science , vol.3152 , pp. 290-305
    • Biham, E.1    Chen, R.2
  • 2
    • 24944584156 scopus 로고    scopus 로고
    • Collisions of SHA-0 and reduced SHA-1
    • R. Cramer, editor, Advances in Cryptology - Eurocrypt'05. Springer
    • E. Biham, R. Chen, A. Joux, P. Carribault, C. Lemuet, and W. Jalby. Collisions of SHA-0 and Reduced SHA-1. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 36-57. Springer, 2005.
    • (2005) Lectures Notes in Computer Science , vol.3494 , pp. 36-57
    • Biham, E.1    Chen, R.2    Joux, A.3    Carribault, P.4    Lemuet, C.5    Jalby, W.6
  • 3
    • 24944511624 scopus 로고    scopus 로고
    • On the impossibility of highly-efficient blockcipher-based hash functions
    • R. Cramer, editor, Advances in Cryptology - Eurocrypt'05. Springer
    • J. Black, M. Cochran, and T. Shrimpton. On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 526-541. Springer, 2005.
    • (2005) Lectures Notes in Computer Science , vol.3494 , pp. 526-541
    • Black, J.1    Cochran, M.2    Shrimpton, T.3
  • 4
    • 84957643546 scopus 로고    scopus 로고
    • Differential collisions in SHA-0
    • H. Krawczyk, editor, Advances in Cryptology - CRYPTO'98. Springer
    • F. Chabaud and A. Joux. Differential Collisions in SHA-0. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO'98, volume 1462 of Lectures Notes in Computer Science, pages 56-71. Springer, 1998.
    • (1998) Lectures Notes in Computer Science , vol.1462 , pp. 56-71
    • Chabaud, F.1    Joux, A.2
  • 5
    • 33745119040 scopus 로고    scopus 로고
    • Merkle-damgård revisited: How to construct a hash function
    • V. Shoup, editor, Advances in Cryptology - Crypto'05. Springer
    • J-S. Coron, Y. Dodis, C. Malinaud, and P. Puniya. Merkle-Damgård Revisited: How to Construct a Hash Function. In V. Shoup, editor, Advances in Cryptology - Crypto'05, volume 3621 of Lectures Notes in Computer Science, pages 430-448. Springer, 2005.
    • (2005) Lectures Notes in Computer Science , vol.3621 , pp. 430-448
    • Coron, J.-S.1    Dodis, Y.2    Malinaud, C.3    Puniya, P.4
  • 6
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • G. Brassard, editor, Advances in Cryptology - Crypto '89. Springer
    • I. Damgård, A Design Principle for Hash Functions. In G. Brassard, editor, Advances in Cryptology - Crypto '89, volume 435 of Lectures Notes in Computer Science, pages 416-427. Springer, 1990.
    • (1990) Lectures Notes in Computer Science , vol.435 , pp. 416-427
    • Damgård, I.1
  • 7
    • 84958953847 scopus 로고    scopus 로고
    • Cryptanalysis of MD4
    • D. Gollmann, editor, Fast Software Encryption - 1996. Springer
    • H. Dobbertin. Cryptanalysis of MD4. In D. Gollmann, editor, Fast Software Encryption - 1996, volume 1039 of Lectures Notes in Computer Science, pages 53-69. Springer, 1996.
    • (1996) Lectures Notes in Computer Science , vol.1039 , pp. 53-69
    • Dobbertin, H.1
  • 8
    • 24944500380 scopus 로고    scopus 로고
    • Provably secure double-block-length hash functions in a black-box model
    • C. Park and S. Chee, editors, Information Security and Cryptology - ICISC'04, Springer
    • S. Hirose. Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. In C. Park and S. Chee, editors, Information Security and Cryptology - ICISC'04, volume 3506 of Lectures Notes in Computer Science, Springer, 2005.
    • (2005) Lectures Notes in Computer Science , vol.3506
    • Hirose, S.1
  • 9
    • 33645780237 scopus 로고    scopus 로고
    • Multicollisions in iterated hash functions. Application to cascaded constructions
    • M. Franklin, editor, Advances in Cryptology - CRYPTO'04. Springer
    • A. Joux. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In M. Franklin, editor, Advances in Cryptology - CRYPTO'04, volume 3152 of Lectures Notes in Computer Science, pages 306-316. Springer, 2004.
    • (2004) Lectures Notes in Computer Science , vol.3152 , pp. 306-316
    • Joux, A.1
  • 10
    • 24944541563 scopus 로고    scopus 로고
    • n work
    • R. Cramer, editor, Advances in Cryptology - Eurocrypt'05. Springer
    • n Work. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 474-490. Springer, 2005.
    • (2005) Lectures Notes in Computer Science , vol.3494 , pp. 474-490
    • Kelsey, J.1    Schneier, B.2
  • 11
    • 33646851509 scopus 로고    scopus 로고
    • Design principles for iterated hash functions
    • S. Lucks. Design Principles for Iterated Hash Functions. Cryptology ePrint Archive, Report 2004/253, 2004. http://eprint.iacr.org/.
    • (2004) Cryptology ePrint Archive, Report , vol.2004 , Issue.253
    • Lucks, S.1
  • 12
    • 84937461306 scopus 로고
    • One way hash functions and DES
    • G. Brassard, editor, Advances in Cryptology - Crypto '89. Springer
    • R. Merkle. One Way Hash Functions and DES. In G. Brassard, editor, Advances in Cryptology - Crypto '89, volume 435 of Lectures Notes in Computer Science, pages 428-446. Springer, 1990.
    • (1990) Lectures Notes in Computer Science , vol.435 , pp. 428-446
    • Merkle, R.1
  • 13
    • 84858882601 scopus 로고    scopus 로고
    • Designs of efficient secure large hash values
    • M. Nandi. Designs of Efficient Secure Large Hash Values. Cryptology ePrint Archive, Report 2004/296, 2004. http://eprint.iacr.org/.
    • (2004) Cryptology ePrint Archive, Report , vol.2004 , Issue.296
    • Nandi, M.1
  • 14
    • 26444539878 scopus 로고    scopus 로고
    • Security analysis of a 2/3-rate double length compression function in black-box model
    • H. Gilbert and H. Handschuh, editors, Fast Software Encryption - FSE'05. Springer
    • M. Nandi, W. Lee, K. Sakurai, and S. Lee. Security analysis of a 2/3-rate double length compression function in black-box model. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption - FSE'05, volume 3557 of Lectures Notes in Computer Science, pages 243-254. Springer, 2005.
    • (2005) Lectures Notes in Computer Science , vol.3557 , pp. 243-254
    • Nandi, M.1    Lee, W.2    Sakurai, K.3    Lee, S.4
  • 15
    • 84858876608 scopus 로고    scopus 로고
    • August
    • National Institute of Standards and Technology (NIST). Secure Hash Standard FTPS Publication 180-2, August 2002. Available at http://csrc.nist.gov/ publications/fips/fips180-2/fips180-2.pdf.
    • (2002) Secure Hash Standard FTPS Publication , vol.180 , Issue.2
  • 16
    • 84937428040 scopus 로고    scopus 로고
    • A generalized birthday problem
    • M. Yung, editor, Advances in Cryptology - Crypto '02. Springer. Extended Abstract
    • D. Wagner. A Generalized Birthday Problem. In M. Yung, editor, Advances in Cryptology - Crypto '02, volume 2442 of Lectures Notes in Computer Science, pages 288-303. Springer, 2002. Extended Abstract.
    • (2002) Lectures Notes in Computer Science , vol.2442 , pp. 288-303
    • Wagner, D.1
  • 17
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the hash functions MD4 and RIPEMD
    • R. Cramer, editor, Advances in Cryptology - Eurocrypt'05. Springer
    • X. Wang, X. Lai, D. Feng, H. Chen, and X. Yu. Cryptanalysis of the Hash Functions MD4 and RIPEMD. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 1-18. Springer, 2005.
    • (2005) Lectures Notes in Computer Science , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 18
    • 33745171465 scopus 로고    scopus 로고
    • Finding collisions in the full SHA1
    • V. Shoup, editor, Advances in Cryptology - Crypto'05. Springer
    • X. Wang, Y. Yin, and H. Yu. Finding Collisions in the Full SHA1. In V. Shoup, editor, Advances in Cryptology - Crypto'05, volume 3621 of Lectures Notes in Computer Science, pages 17-36. Springer, 2005.
    • (2005) Lectures Notes in Computer Science , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.2    Yu, H.3
  • 19
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • R. Cramer, editor, Advances in Cryptology - Eurocrypt'05. Springer
    • X. Wang and H. Yu, How to Break MD5 and Other Hash Functions. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 19-35. Springer, 2005.
    • (2005) Lectures Notes in Computer Science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 20
    • 33745122987 scopus 로고    scopus 로고
    • Efficient collision search attacks on SHAO
    • V. Shoup, editor, Advances in Cryptology - Crypto'05. Springer
    • X. Wang, H. Yu, and Y. Yin. Efficient Collision Search Attacks on SHAO. In V. Shoup, editor, Advances in Cryptology - Crypto'05, volume 3621 of Lectures Notes in Computer Science, pages 1-16. Springer, 2005.
    • (2005) Lectures Notes in Computer Science , vol.3621 , pp. 1-16
    • Wang, X.1    Yu, H.2    Yin, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.