-
1
-
-
33744742484
-
-
Bellovin S, Rescorla E. Deploying a new hash algorithm. In: Proceedings of NDSS '06; 2006.
-
-
-
-
2
-
-
33744730522
-
-
Bernstein DJ. Salsa20 specification. eSTREAM, ECRYPT Stream Cipher Project, Report 2005/025, ; 2005.
-
-
-
-
3
-
-
24944584156
-
Collisions of SHA-0 and reduced SHA-1
-
Eurocrypt 2005, Springer
-
Biham E., Chen R., Joux A., Carribault P., Lemuet C., and Jalby W. Collisions of SHA-0 and reduced SHA-1. Eurocrypt 2005. Lecture notes in computer science vol. 3494 (2005), Springer 36-57
-
(2005)
Lecture notes in computer science
, vol.3494
, pp. 36-57
-
-
Biham, E.1
Chen, R.2
Joux, A.3
Carribault, P.4
Lemuet, C.5
Jalby, W.6
-
4
-
-
50449107349
-
Black-box analysis of the block-cipher-based hash-function constructions from PGV
-
CRYPTO, Springer
-
Black J., Rogaway P., and Shrimpton T. Black-box analysis of the block-cipher-based hash-function constructions from PGV. CRYPTO. Lecture notes in computer science vol. 2442 (2002), Springer 320-335
-
(2002)
Lecture notes in computer science
, vol.2442
, pp. 320-335
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
7
-
-
84958953847
-
Cryptanalysis of md4
-
Fast software encryption, Springer
-
Dobbertin H. Cryptanalysis of md4. Fast software encryption. Lecture notes in computer science vol. 1039 (1996), Springer 53-69
-
(1996)
Lecture notes in computer science
, vol.1039
, pp. 53-69
-
-
Dobbertin, H.1
-
8
-
-
84958957924
-
RIPEMD-160: a strengthened version of RIPEMD
-
Fast software encryption, Springer
-
Dobbertin H., Bosselaers A., and Preneel B. RIPEMD-160: a strengthened version of RIPEMD. Fast software encryption. Lecture notes in computer science vol. 1039 (1996), Springer 71-82
-
(1996)
Lecture notes in computer science
, vol.1039
, pp. 71-82
-
-
Dobbertin, H.1
Bosselaers, A.2
Preneel, B.3
-
9
-
-
33744729186
-
-
ECRYPT Network of Excellence. Recent collision attacks on hash functions: ECRYPT position paper. ECRYPT Report, ; 2005.
-
-
-
-
11
-
-
33744768524
-
-
International Organization for Standardization. ISO/IEC 10118-3:2004. Information technology - security techniques - hash-functions - part 3: dedicated hash-functions; 2004.
-
-
-
-
12
-
-
33744720909
-
-
Krawczyk H, Bellare M, Canetti R. HMAC: keyed-hashing for message authentication. Internet RFC 2104; February 1997.
-
-
-
-
13
-
-
33644518261
-
Find me a hash
-
Landau S. Find me a hash. Notices of the AMS 53 3 (March 2006) 330-332
-
(2006)
Notices of the AMS
, vol.53
, Issue.3
, pp. 330-332
-
-
Landau, S.1
-
14
-
-
33744736793
-
-
Lenstra A, Wang X, Weger B. Colliding x.509 certificates. Cryptology ePrint Archive, Report 2005/067, ; 2005.
-
-
-
-
17
-
-
33744732322
-
-
National Bureau of Standards. The data encryption standard. Federal Information processing standards publication (FIPS) 46; 1977.
-
-
-
-
18
-
-
33744777051
-
-
National Institute of Standards and Technology. Secure hash standard. Federal information processing standards publication (FIPS) 180; 1993.
-
-
-
-
19
-
-
33744751694
-
-
National Institute of Standards and Technology. The advanced encryption standard. Federal information processing standards publication (FIPS) 197; 2001.
-
-
-
-
20
-
-
33744764786
-
-
National Institute of Standards and Technology. Secure hash standard. Federal information processing standards publication (FIPS) 180-2; 2002.
-
-
-
-
21
-
-
33744720581
-
-
Rijmen V, Barreto P. Whirlpool hash function. NESSIE report; 2003.
-
-
-
-
22
-
-
78650922644
-
The MD4 message digest algorithm
-
CRYPTO 90, Springer
-
Rivest R.L. The MD4 message digest algorithm. CRYPTO 90. Lecture notes in computer science vol. 537 (1991), Springer 303-311
-
(1991)
Lecture notes in computer science
, vol.537
, pp. 303-311
-
-
Rivest, R.L.1
-
23
-
-
33744727069
-
-
Rivest RL. The MD5 message-digest algorithm. Internet RFC 1321; 1992.
-
-
-
-
26
-
-
24944591357
-
How to break MD5 and other hash functions
-
Eurocrypt 2005, Springer
-
Wang X., and Yu H. How to break MD5 and other hash functions. Eurocrypt 2005. Lecture notes in computer science vol. 3494 (2005), Springer 19-35
-
(2005)
Lecture notes in computer science
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
27
-
-
24944575304
-
Cryptanalysis of the hash functions MD4 and RIPEMD
-
Eurocrypt 2005, Springer
-
Wang X., Lai X., Feng D., Chen H., and Yu X. Cryptanalysis of the hash functions MD4 and RIPEMD. Eurocrypt 2005. Lecture notes in computer science vol. 3494 (2005), Springer 1-18
-
(2005)
Lecture notes in computer science
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
28
-
-
33745171465
-
Finding collisions in the full SHA-1
-
CRYPTO, Springer
-
Wang X., Yin Y.L., and Yu H. Finding collisions in the full SHA-1. CRYPTO. Lecture notes in computer science vol. 3621 (2005), Springer 17-36
-
(2005)
Lecture notes in computer science
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
29
-
-
74549196057
-
How to swindle Rabin
-
Yuval G. How to swindle Rabin. Cryptologia 3 (July 1979) 187-189
-
(1979)
Cryptologia
, vol.3
, pp. 187-189
-
-
Yuval, G.1
|