메뉴 건너뛰기




Volumn 4047 LNCS, Issue , 2006, Pages 179-194

Breaking the ICE - Finding multicollisions in Iterated Concatenated and Expanded (ICE) hash functions

Author keywords

Cryptanalysis; Hash functions; Iterated hash functions; Multicollisions; Tree based hash functions

Indexed keywords

CRYPTOGRAPHY; ITERATIVE METHODS; MATHEMATICAL MODELS; SECURITY OF DATA; SYSTEMS ANALYSIS; TREES (MATHEMATICS);

EID: 33746757648     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11799313_12     Document Type: Conference Paper
Times cited : (38)

References (18)
  • 2
    • 84941156057 scopus 로고    scopus 로고
    • A framework for the design of one- way hash functions including cryptanalysis of damgrd's one-way function based on a cellular automaton
    • J. Daemen, R. Govaerts & J. Vandewalle, A Framework for the Design of One- Way Hash Functions Including Cryptanalysis of Damgrd's One-Way Function Based on a Cellular Automaton, Asiacrypt 1991
    • Asiacrypt 1991
    • Daemen, J.1    Govaerts, R.2    Vandewalle, J.3
  • 3
    • 24944508357 scopus 로고    scopus 로고
    • On the design of provably secure cryptographic hash
    • A. De Santis & M. Yung, On the Design of Provably Secure Cryptographic Hash, Eurocrypt 1990
    • Eurocrypt 1990
    • De Santis, A.1    Yung, M.2
  • 5
    • 84941156376 scopus 로고    scopus 로고
    • Multicollisions in iterated hash functions
    • A. Joux, Multicollisions in Iterated Hash Functions, Crypto 2004.
    • Crypto 2004
    • Joux, A.1
  • 6
    • 84941147976 scopus 로고    scopus 로고
    • A simple and provably good code for SHA message expansion
    • C. Jutla & A. Patthak, A Simple and Provably Good Code for SHA Message Expansion, IACR preprint archive
    • IACR Preprint Archive
    • Jutla, C.1    Patthak, A.2
  • 9
    • 33646851509 scopus 로고    scopus 로고
    • Design principles for iterated hash functions
    • S. Lucks, Design Principles for Iterated Hash Functions IACR preprint archive
    • IACR Preprint Archive
    • Lucks, S.1
  • 14
    • 0001797564 scopus 로고    scopus 로고
    • PayWord and microMint: Two simple micropayment schemes
    • R. Rivest & A. Shamir, PayWord and MicroMint: Two simple micropayment schemes, CryptoBytes, volume 2, number 1
    • CryptoBytes , vol.2 , Issue.1
    • Rivest, R.1    Shamir, A.2
  • 15
    • 27644501857 scopus 로고    scopus 로고
    • Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
    • P. Rogaway & T. Shrimpton, Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance, Fast Software Encryption 2004
    • Fast Software Encryption 2004
    • Rogaway, P.1    Shrimpton, T.2
  • 17
    • 33745179728 scopus 로고    scopus 로고
    • Efficient collision search attacks on SHA-0
    • X. Wang, H. Yu & Y. Yin, Efficient Collision Search Attacks on SHA-0,Crypto 2005
    • Crypto 2005
    • Wang, X.1    Yu, H.2    Yin, Y.3
  • 18
    • 33646754186 scopus 로고    scopus 로고
    • Finding Collisions in the full SHA-1 collision search attacks on SHA1
    • X.Wang, Y. Yin & H. Yu, Finding Collisions in the Full SHA-1 Collision Search Attacks on SHA1, Crypto 2005
    • Crypto 2005
    • Wang, X.1    Yin, Y.2    Yu, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.