메뉴 건너뛰기




Volumn 53, Issue 2, 2007, Pages 759-767

Multicollision attacks on some generalized sequential hash functions

Author keywords

Birthday attack; Hash function; Multicollision attack

Indexed keywords

FUNCTIONS; ITERATIVE METHODS; SIGNAL PROCESSING;

EID: 33847688060     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2006.889721     Document Type: Article
Times cited : (38)

References (25)
  • 4
    • 0019095611 scopus 로고
    • "The application of digital signatures based on public key cryptosystems"
    • in Atlanta, GA, Oct
    • D. W. Davies and W. L. Price, "The application of digital signatures based on public key cryptosystems," in Proc. 5th Int. Computer Communications Conf., Atlanta, GA, Oct. 1980, pp. 525-530.
    • (1980) Proc. 5th Int. Computer Communications Conf. , pp. 525-530
    • Davies, D.W.1    Price, W.L.2
  • 5
  • 7
    • 84955562814 scopus 로고
    • "On the length of cryptographic hash-values used in identification schemes"
    • in Berlin, Germany: Springer-Verlag
    • M. Girault and J. Stern, "On the length of cryptographic hash-values used in identification schemes," in Advances in Cryptology - RYPTO '94 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 1994, vol. 839, pp. 202-215.
    • (1994) Advances in Cryptology - RYPTO '94 (Lecture Notes in Computer Science) , vol.839 , pp. 202-215
    • Girault, M.1    Stern, J.2
  • 9
    • 24944500380 scopus 로고    scopus 로고
    • "Provably secure double-block-length hash functions in a black-box model"
    • in Berlin, Germany: Springer-Verlag
    • S. Hirose, "Provably secure double-block-length hash functions in a black-box model," in Information Security and Cryptology - ICISC 2004 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2005, vol. 3506, pp. 330-342.
    • (2005) Information Security and Cryptology - ICISC 2004 (Lecture Notes in Computer Science) , vol.3506 , pp. 330-342
    • Hirose, S.1
  • 10
    • 33746757648 scopus 로고    scopus 로고
    • "Breaking the ICE - Finding multicollisions in iterated concatenated and expanded (ICE) hash functions"
    • in Berlin, Germany: Springer-Verlag
    • J. J. Hoch and A. Shamir, "Breaking the ICE - Finding multicollisions in iterated concatenated and expanded (ICE) hash functions," in Fast Software Encryption 2006 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2006, vol. 4047, pp. 179-194.
    • (2006) Fast Software Encryption 2006 (Lecture Notes in Computer Science) , vol.4047 , pp. 179-194
    • Hoch, J.J.1    Shamir, A.2
  • 11
    • 33645780237 scopus 로고    scopus 로고
    • "Multicollisions in iterated hash functions. Application to cascaded constructions"
    • in Berlin, Germany: Springer-Verlag
    • A. Joux, "Multicollisions in iterated hash functions. Application to cascaded constructions," in Advances in Cryptology - CRYPTO 2004 (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2004, vol. 3152, pp. 306-316.
    • (2004) Advances in Cryptology - CRYPTO 2004 (Lecture Notes in Computer Science) , vol.3152 , pp. 306-316
    • Joux, A.1
  • 13
    • 0001769898 scopus 로고    scopus 로고
    • "Attacks on fast double block length hash functions"
    • L. Knudsen, X. Lai, and B. Preneel, "Attacks on fast double block length hash functions," J. Cryptol., vol. 11, pp. 59-72, 1998.
    • (1998) J. Cryptol. , vol.11 , pp. 59-72
    • Knudsen, L.1    Lai, X.2    Preneel, B.3
  • 14
    • 0036714381 scopus 로고    scopus 로고
    • "Construction of secure and fast hash functions using nonbinary error-correcting codes"
    • Sep
    • L. Knudsen and B. Preneel, "Construction of secure and fast hash functions using nonbinary error-correcting codes," IEEE Trans. Inf. Theory, vol. 48, no. 9, pp. 2524-2539, Sep. 2002.
    • (2002) IEEE Trans. Inf. Theory , vol.48 , Issue.9 , pp. 2524-2539
    • Knudsen, L.1    Preneel, B.2
  • 18
    • 33746776604 scopus 로고    scopus 로고
    • "Design of Iteration on hash functions and its cryptanalysis"
    • Ph.D. dissertation, Indian Statistical Institute, Kolkata, India
    • M. Nandi, "Design of Iteration on hash functions and its cryptanalysis," Ph.D. dissertation, Indian Statistical Institute, Kolkata, India, 2005.
    • (2005)
    • Nandi, M.1
  • 20
    • 0003746279 scopus 로고
    • "Analysis and Design of Cryptographic Hash Functions D"
    • Ph.D. dissertation, Katholieke Universiteit Leuven, Leuven, Belgium
    • B. Preneel, "Analysis and Design of Cryptographic Hash Functions, D," Ph.D. dissertation, Katholieke Universiteit Leuven, Leuven, Belgium, 1993.
    • (1993)
    • Preneel, B.1
  • 21
    • 0001797564 scopus 로고    scopus 로고
    • "PayWord and MicroMint"
    • R. Rivest and A. Shamir, "PayWord and MicroMint," CryptoBytes, vol. 2, no. 1, pp. 7-11, 1996.
    • (1996) CryptoBytes , vol.2 , Issue.1 , pp. 7-11
    • Rivest, R.1    Shamir, A.2
  • 25
    • 30744432873 scopus 로고    scopus 로고
    • "Some observations on the theory of cryptographic hash functions"
    • D. R. Stinson, "Some observations on the theory of cryptographic hash functions," Des., Codes Cryptogr., vol. 38, pp. 259-277, 2006.
    • (2006) Des., Codes Cryptogr. , vol.38 , pp. 259-277
    • Stinson, D.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.