-
1
-
-
35048892549
-
Near-collisions of SHA-0
-
M. Franklin, editor, Advances in Cryptology - CRYPTO'04. Springer
-
E. Biham and R. Chen. Near-Collisions of SHA-0. In M. Franklin, editor, Advances in Cryptology - CRYPTO'04, volume 3152 of Lectures Notes in Computer Science, pages 290-305. Springer, 2004.
-
(2004)
Lectures Notes in Computer Science
, vol.3152
, pp. 290-305
-
-
Biham, E.1
Chen, R.2
-
2
-
-
24944584156
-
Collisions of SHA-0 and reduced SHA-1
-
R. Cramer, editor, Advances in Cryptology - Eurocrypt'05. Springer
-
E. Biham, R. Chen, A. Joux, P. Carribault, C. Lemuet, and W. Jalby. Collisions of SHA-0 and Reduced SHA-1. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 36-57. Springer, 2005.
-
(2005)
Lectures Notes in Computer Science
, vol.3494
, pp. 36-57
-
-
Biham, E.1
Chen, R.2
Joux, A.3
Carribault, P.4
Lemuet, C.5
Jalby, W.6
-
3
-
-
24944511624
-
On the impossibility of highly-efficient blockcipher-based hash functions
-
R. Cramer, editor, Advances in Cryptology - Eurocrypt'05. Springer
-
J. Black, M. Cochran, and T. Shrimpton. On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 526-541. Springer, 2005.
-
(2005)
Lectures Notes in Computer Science
, vol.3494
, pp. 526-541
-
-
Black, J.1
Cochran, M.2
Shrimpton, T.3
-
4
-
-
84957643546
-
Differential collisions in SHA-0
-
H. Krawczyk, editor, Advances in Cryptology - CRYPTO'98. Springer
-
F. Chabaud and A. Joux. Differential Collisions in SHA-0. In H. Krawczyk, editor, Advances in Cryptology - CRYPTO'98, volume 1462 of Lectures Notes in Computer Science, pages 56-71. Springer, 1998.
-
(1998)
Lectures Notes in Computer Science
, vol.1462
, pp. 56-71
-
-
Chabaud, F.1
Joux, A.2
-
5
-
-
33745119040
-
Merkle-damgård revisited: How to construct a hash function
-
V. Shoup, editor, Advances in Cryptology - Crypto'05. Springer
-
J-S. Coron, Y. Dodis, C. Malinaud, and P. Puniya. Merkle-Damgård Revisited: How to Construct a Hash Function. In V. Shoup, editor, Advances in Cryptology - Crypto'05, volume 3621 of Lectures Notes in Computer Science, pages 430-448. Springer, 2005.
-
(2005)
Lectures Notes in Computer Science
, vol.3621
, pp. 430-448
-
-
Coron, J.-S.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
6
-
-
84981199109
-
A design principle for hash functions
-
G. Brassard, editor, Advances in Cryptology - Crypto '89. Springer
-
I. Damgård, A Design Principle for Hash Functions. In G. Brassard, editor, Advances in Cryptology - Crypto '89, volume 435 of Lectures Notes in Computer Science, pages 416-427. Springer, 1990.
-
(1990)
Lectures Notes in Computer Science
, vol.435
, pp. 416-427
-
-
Damgård, I.1
-
7
-
-
84958953847
-
Cryptanalysis of MD4
-
D. Gollmann, editor, Fast Software Encryption - 1996. Springer
-
H. Dobbertin. Cryptanalysis of MD4. In D. Gollmann, editor, Fast Software Encryption - 1996, volume 1039 of Lectures Notes in Computer Science, pages 53-69. Springer, 1996.
-
(1996)
Lectures Notes in Computer Science
, vol.1039
, pp. 53-69
-
-
Dobbertin, H.1
-
8
-
-
24944500380
-
Provably secure double-block-length hash functions in a black-box model
-
C. Park and S. Chee, editors, Information Security and Cryptology - ICISC'04, Springer
-
S. Hirose. Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. In C. Park and S. Chee, editors, Information Security and Cryptology - ICISC'04, volume 3506 of Lectures Notes in Computer Science, Springer, 2005.
-
(2005)
Lectures Notes in Computer Science
, vol.3506
-
-
Hirose, S.1
-
9
-
-
33645780237
-
Multicollisions in iterated hash functions. Application to cascaded constructions
-
M. Franklin, editor, Advances in Cryptology - CRYPTO'04. Springer
-
A. Joux. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In M. Franklin, editor, Advances in Cryptology - CRYPTO'04, volume 3152 of Lectures Notes in Computer Science, pages 306-316. Springer, 2004.
-
(2004)
Lectures Notes in Computer Science
, vol.3152
, pp. 306-316
-
-
Joux, A.1
-
10
-
-
24944541563
-
n work
-
R. Cramer, editor, Advances in Cryptology - Eurocrypt'05. Springer
-
n Work. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 474-490. Springer, 2005.
-
(2005)
Lectures Notes in Computer Science
, vol.3494
, pp. 474-490
-
-
Kelsey, J.1
Schneier, B.2
-
11
-
-
33646851509
-
Design principles for iterated hash functions
-
S. Lucks. Design Principles for Iterated Hash Functions. Cryptology ePrint Archive, Report 2004/253, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.253
-
-
Lucks, S.1
-
12
-
-
84937461306
-
One way hash functions and DES
-
G. Brassard, editor, Advances in Cryptology - Crypto '89. Springer
-
R. Merkle. One Way Hash Functions and DES. In G. Brassard, editor, Advances in Cryptology - Crypto '89, volume 435 of Lectures Notes in Computer Science, pages 428-446. Springer, 1990.
-
(1990)
Lectures Notes in Computer Science
, vol.435
, pp. 428-446
-
-
Merkle, R.1
-
13
-
-
84858882601
-
Designs of efficient secure large hash values
-
M. Nandi. Designs of Efficient Secure Large Hash Values. Cryptology ePrint Archive, Report 2004/296, 2004. http://eprint.iacr.org/.
-
(2004)
Cryptology ePrint Archive, Report
, vol.2004
, Issue.296
-
-
Nandi, M.1
-
14
-
-
26444539878
-
Security analysis of a 2/3-rate double length compression function in black-box model
-
H. Gilbert and H. Handschuh, editors, Fast Software Encryption - FSE'05. Springer
-
M. Nandi, W. Lee, K. Sakurai, and S. Lee. Security analysis of a 2/3-rate double length compression function in black-box model. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption - FSE'05, volume 3557 of Lectures Notes in Computer Science, pages 243-254. Springer, 2005.
-
(2005)
Lectures Notes in Computer Science
, vol.3557
, pp. 243-254
-
-
Nandi, M.1
Lee, W.2
Sakurai, K.3
Lee, S.4
-
15
-
-
84858876608
-
-
August
-
National Institute of Standards and Technology (NIST). Secure Hash Standard FTPS Publication 180-2, August 2002. Available at http://csrc.nist.gov/ publications/fips/fips180-2/fips180-2.pdf.
-
(2002)
Secure Hash Standard FTPS Publication
, vol.180
, Issue.2
-
-
-
16
-
-
84937428040
-
A generalized birthday problem
-
M. Yung, editor, Advances in Cryptology - Crypto '02. Springer. Extended Abstract
-
D. Wagner. A Generalized Birthday Problem. In M. Yung, editor, Advances in Cryptology - Crypto '02, volume 2442 of Lectures Notes in Computer Science, pages 288-303. Springer, 2002. Extended Abstract.
-
(2002)
Lectures Notes in Computer Science
, vol.2442
, pp. 288-303
-
-
Wagner, D.1
-
17
-
-
24944575304
-
Cryptanalysis of the hash functions MD4 and RIPEMD
-
R. Cramer, editor, Advances in Cryptology - Eurocrypt'05. Springer
-
X. Wang, X. Lai, D. Feng, H. Chen, and X. Yu. Cryptanalysis of the Hash Functions MD4 and RIPEMD. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 1-18. Springer, 2005.
-
(2005)
Lectures Notes in Computer Science
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
18
-
-
33745171465
-
Finding collisions in the full SHA1
-
V. Shoup, editor, Advances in Cryptology - Crypto'05. Springer
-
X. Wang, Y. Yin, and H. Yu. Finding Collisions in the Full SHA1. In V. Shoup, editor, Advances in Cryptology - Crypto'05, volume 3621 of Lectures Notes in Computer Science, pages 17-36. Springer, 2005.
-
(2005)
Lectures Notes in Computer Science
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.2
Yu, H.3
-
19
-
-
24944591357
-
How to break MD5 and other hash functions
-
R. Cramer, editor, Advances in Cryptology - Eurocrypt'05. Springer
-
X. Wang and H. Yu, How to Break MD5 and Other Hash Functions. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 19-35. Springer, 2005.
-
(2005)
Lectures Notes in Computer Science
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
20
-
-
33745122987
-
Efficient collision search attacks on SHAO
-
V. Shoup, editor, Advances in Cryptology - Crypto'05. Springer
-
X. Wang, H. Yu, and Y. Yin. Efficient Collision Search Attacks on SHAO. In V. Shoup, editor, Advances in Cryptology - Crypto'05, volume 3621 of Lectures Notes in Computer Science, pages 1-16. Springer, 2005.
-
(2005)
Lectures Notes in Computer Science
, vol.3621
, pp. 1-16
-
-
Wang, X.1
Yu, H.2
Yin, Y.3
|