-
1
-
-
0019669180
-
An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems
-
Charles Asmuth and G. R. Blakely. An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems. Computers and Mathematics with Applications, 7:447-450, 1981.
-
(1981)
Computers and Mathematics with Applications
, vol.7
, pp. 447-450
-
-
Asmuth, C.1
Blakely, G.R.2
-
3
-
-
24944511624
-
On the impossibility of highly efficient blockcipher-based hash functions
-
Proceedings of Eurocrypt '05. Springer-Verlag
-
John Black, Martin Cochran, and Thomas Shrimpton. On the impossibility of highly efficient blockcipher-based hash functions. In Proceedings of Eurocrypt '05, volume 3494 of LNCS. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
-
-
Black, J.1
Cochran, M.2
Shrimpton, T.3
-
4
-
-
33749583766
-
Black-box analysis of the block-cipher-based hash-function constructions from PGV
-
LNCS. Springer-Verlag
-
John Black, Phillip Rogaway, and Thomas Shrimpton. Black-box analysis of the block-cipher-based hash-function constructions from PGV. In Proceedings of Crypto '02, LNCS. Springer-Verlag, 2002.
-
(2002)
Proceedings of Crypto '02
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
5
-
-
33745119040
-
Merkle-Damgård revisited: How to construct a hash function
-
Proceedings of Crypto '05. Springer-Verlag
-
Jean-Sebastian Coron, Yevgeniy Dodis, Cecile Malinaud, and Prashant Puniya. Merkle-Damgård revisited: how to construct a hash function. In Proceedings of Crypto '05, volume 3621 of LNCS. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3621
-
-
Coron, J.-S.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
6
-
-
0001744332
-
A design principle for hash functions
-
LNCS. Springer-Verlag
-
Ivan B. Damgård. A design principle for hash functions. In Proceedings of Crypto '89, LNCS. Springer-Verlag, 1989.
-
(1989)
Proceedings of Crypto '89
-
-
Damgård, I.B.1
-
7
-
-
24144468589
-
Chosen ciphertext security of multiple encryption
-
Yevgeniy Dodis and Jonathan Katz. Chosen ciphertext security of multiple encryption. In Proceedings of TCC '05, pages 188-209, 2005.
-
(2005)
Proceedings of TCC '05
, pp. 188-209
-
-
Dodis, Y.1
Katz, J.2
-
8
-
-
24944472289
-
On robust combiners for oblivious transfer and other primitives
-
Danny Harnik, Joe Kilian, Moni Naor, Omer Reingold, and Alon Rosen. On robust combiners for oblivious transfer and other primitives. In Proceedings of Eurocrypt '05, pages 96-113, 2005.
-
(2005)
Proceedings of Eurocrypt '05
, pp. 96-113
-
-
Harnik, D.1
Kilian, J.2
Naor, M.3
Reingold, O.4
Rosen, A.5
-
10
-
-
84941148358
-
Breaking the ICE - Finding multicollisions in iterated concatenated and expanded (ICE) hash functions
-
Jonathan Hoch and Adi Shamir. Breaking the ICE - finding multicollisions in iterated concatenated and expanded (ICE) hash functions. In Proceedings of FSE '06, 2006.
-
(2006)
Proceedings of FSE '06
-
-
Hoch, J.1
Shamir, A.2
-
11
-
-
24144493423
-
How to securely outsource cryptographic computations
-
Susan Hohenberger and Anna Lysyanskaya. How to securely outsource cryptographic computations. In Proceedings of TCC '05, pages 264-282, 2005.
-
(2005)
Proceedings of TCC '05
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
12
-
-
33645780237
-
Multicollisions in iterated hash functions, application to cascaded constructions
-
Proceedings of Crypto '04. Springer-Verlag
-
Antoine Joux. Multicollisions in iterated hash functions, application to cascaded constructions. In Proceedings of Crypto '04, volume 3152 of LNCS, pages 306-316. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3152
, pp. 306-316
-
-
Joux, A.1
-
13
-
-
84941149388
-
Can we get a reduction proof for truncated hashes?
-
John Kelsey. Can we get a reduction proof for truncated hashes? Crypto '05 rump session, 2005.
-
(2005)
Crypto '05 Rump Session
-
-
Kelsey, J.1
-
15
-
-
0000966673
-
One way hash functions and des
-
LNCS. Springer-Verlag
-
Ralph C. Merkle. One way hash functions and DES. In Proceedings of Crypto '89, LNCS. Springer-Verlag, 1989.
-
(1989)
Proceedings of Crypto '89
-
-
Merkle, R.C.1
-
17
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
Moni Naor and Moti Yung. Universal one-way hash functions and their cryptographic applications. In Proceedings of STOC'89, pages 33-43, 1989.
-
(1989)
Proceedings of STOC'89
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
19
-
-
0002270245
-
Hash functions based on block ciphers: A synthetic approach
-
LNCS. Springer-Verlag
-
Bart Preneel, René Govaerts, and Joos Vandewalle. Hash functions based on block ciphers: A synthetic approach. In Proceedings of Crypto '93, LNCS. Springer-Verlag, 1993.
-
(1993)
Proceedings of Crypto '93
-
-
Preneel, B.1
Govaerts, R.2
Vandewalle, J.3
-
20
-
-
24944575304
-
Cryptanalysis of the hash functions MD4 and RIPEMD
-
Proceedings of Eurocrypt '05. Springer-Verlag
-
Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, and Xiuyuan Yu. Cryptanalysis of the hash functions MD4 and RIPEMD. In Proceedings of Eurocrypt '05, volume 3494 of LNCS, pages 1-18. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
22
-
-
33745171465
-
Finding collisions in the full SHA-1
-
Proceedings of Crypto '05. Springer-Verlag
-
Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu. Finding collisions in the full SHA-1. In Proceedings of Crypto '05, volume 3621 of LNCS. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3621
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
23
-
-
24944591357
-
How to break MD5 and other hash functions
-
Proceedings of Eurocrypt '05. Springer-Verlag
-
Xiaoyun Wang and Hongbo Yu. How to break MD5 and other hash functions. In Proceedings of Eurocrypt '05, volume 3494 of LNCS, pages 19-35. Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
|