-
1
-
-
34547456042
-
-
I. Arce, A. Azubel, E. Kargieman, G. Richarte, C. Sarraute, and A. Waissbein. An attack on the MySQL authentication protocol. 2002. Technical report from Core Security Technologies.
-
I. Arce, A. Azubel, E. Kargieman, G. Richarte, C. Sarraute, and A. Waissbein. An attack on the MySQL authentication protocol. 2002. Technical report from Core Security Technologies.
-
-
-
-
2
-
-
33745119040
-
-
J-S. Coron, Y. Dodis, C. Malinaud, and P. Puniya. Merkle-Damgárd Revisited: How to Construct a Hash Function. In V. Shoup, editor, Advances in Cryptology - Crypto '05, 3621 of Lectures Notes in Computer Science, pages 430-448. Springer, 2005.
-
J-S. Coron, Y. Dodis, C. Malinaud, and P. Puniya. Merkle-Damgárd Revisited: How to Construct a Hash Function. In V. Shoup, editor, Advances in Cryptology - Crypto '05, volume 3621 of Lectures Notes in Computer Science, pages 430-448. Springer, 2005.
-
-
-
-
3
-
-
26444471932
-
-
J. Hong, D. Lee, Y. Yeom, and D. Han. A New Class of Single Cycle T-functions. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption - 2005, 3557 of Lectures Notes in Computer Science, pages 68-82. Springer, 2005.
-
J. Hong, D. Lee, Y. Yeom, and D. Han. A New Class of Single Cycle T-functions. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption - 2005, volume 3557 of Lectures Notes in Computer Science, pages 68-82. Springer, 2005.
-
-
-
-
4
-
-
33645780237
-
-
A. Joux. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In M. Franklin, editor, Advances in Cryptology - CRYPTO'04, 3152 of Lectures Notes in Computer Science, pages 306-316. Springer, 2004.
-
A. Joux. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In M. Franklin, editor, Advances in Cryptology - CRYPTO'04, volume 3152 of Lectures Notes in Computer Science, pages 306-316. Springer, 2004.
-
-
-
-
5
-
-
24944541563
-
-
n Work. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, 3494 of Lectures Notes in Computer Science, pages 474-490. Springer, 2005.
-
n Work. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 474-490. Springer, 2005.
-
-
-
-
7
-
-
35248838905
-
-
A. Klimov and A. Shamir. A New Class of Invertible Mappings. In B. Kaliski, Ç. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES) - 2002, 2523 of Lectures Notes in Computer Science, pages 470-483. Springer, 2002.
-
A. Klimov and A. Shamir. A New Class of Invertible Mappings. In B. Kaliski, Ç. Koç, and C. Paar, editors, Cryptographic Hardware and Embedded Systems (CHES) - 2002, volume 2523 of Lectures Notes in Computer Science, pages 470-483. Springer, 2002.
-
-
-
-
8
-
-
35048887028
-
-
A. Klimov and A. Shamir. Cryptographic Applications of T-functions. In M. Matsui and R. Zuccherato, editors, Selected Areas in Cryptography - 2003, 3006 of Lectures Notes in Computer Science, pages 248-261. Springer, 2004.
-
A. Klimov and A. Shamir. Cryptographic Applications of T-functions. In M. Matsui and R. Zuccherato, editors, Selected Areas in Cryptography - 2003, volume 3006 of Lectures Notes in Computer Science, pages 248-261. Springer, 2004.
-
-
-
-
9
-
-
26444603942
-
-
A. Klimov and A. Shamir, New Applications of T-functions in Block Ciphers and Hash Functions. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption - 2005, 3557 of Lectures Notes in Computer Science, pages 18-31, Springer, 2005.
-
A. Klimov and A. Shamir, New Applications of T-functions in Block Ciphers and Hash Functions. In H. Gilbert and H. Handschuh, editors, Fast Software Encryption - 2005, volume 3557 of Lectures Notes in Computer Science, pages 18-31, Springer, 2005.
-
-
-
-
10
-
-
26444604937
-
-
L. Knudsen, SMASH - A Cryptographic Hash Function. In H. Gilbert and H, Hand-schuh, editors, Fast Software Encryption - 2005, 3557 of Lectures Notes in Computer Science, pages 228-242, Springer, 2005.
-
L. Knudsen, SMASH - A Cryptographic Hash Function. In H. Gilbert and H, Hand-schuh, editors, Fast Software Encryption - 2005, volume 3557 of Lectures Notes in Computer Science, pages 228-242, Springer, 2005.
-
-
-
-
11
-
-
33646195464
-
-
S. Künzli, P. Junod, and W. Meier. Distinguishing Attacks on T-Functions. In E. Dawson and S. Vaudenay, editors, International Conference on Cryptology in Malaysia (MyCrypt 2005), 3715 of Lectures Notes in Computer Science, pages 2-15. Springer, 2005.
-
S. Künzli, P. Junod, and W. Meier. Distinguishing Attacks on T-Functions. In E. Dawson and S. Vaudenay, editors, International Conference on Cryptology in Malaysia (MyCrypt 2005), volume 3715 of Lectures Notes in Computer Science, pages 2-15. Springer, 2005.
-
-
-
-
12
-
-
84944878354
-
-
A. Menezes, P. van 0orschot, and S. Vanstone, Handbook of Applied Cryptography. CRC Press, 1996.
-
A. Menezes, P. van 0orschot, and S. Vanstone, Handbook of Applied Cryptography. CRC Press, 1996.
-
-
-
-
13
-
-
26444432184
-
-
J. Mitra and P. Sarkar. Time-Memory Trade-Off Attacks on Multiplications and T-functions, In P. Lee, editor, Advances in Cryptology - Asiacrypt'04, 3329 of Lectures Notes in Computer Science, pages 468-482. Springer, 2004.
-
J. Mitra and P. Sarkar. Time-Memory Trade-Off Attacks on Multiplications and T-functions, In P. Lee, editor, Advances in Cryptology - Asiacrypt'04, volume 3329 of Lectures Notes in Computer Science, pages 468-482. Springer, 2004.
-
-
-
-
14
-
-
33646818680
-
-
F. Muller and T. Peyrin. Linear Cryptanalysis of the TSC Family of Stream Ciphers. In B. K. Roy, editor, Advances in Cryptology - Asiacrypt'05, 3788 of Lectures Notes in Computer Science, pages 373-394. Springer, 2005.
-
F. Muller and T. Peyrin. Linear Cryptanalysis of the TSC Family of Stream Ciphers. In B. K. Roy, editor, Advances in Cryptology - Asiacrypt'05, volume 3788 of Lectures Notes in Computer Science, pages 373-394. Springer, 2005.
-
-
-
-
17
-
-
34547415046
-
-
National Institute of Standards and Technology NIST, April, Available at
-
National Institute of Standards and Technology (NIST). Secure Hash Standard FIPS Publication 180-1, April 1995. Available at http://www.itl.nist. gov/fipspubs/fip180-1.htm.
-
(1995)
Secure Hash Standard FIPS Publication 180-1
-
-
-
18
-
-
34547491324
-
-
J. Patarin and P. Camion. Design of Near-Optimal Pseudorandom Functions and Pseudorandom Permutations in the Information-Theoretic Model. Cryptology ePrint Archive, Report 2005/135, 2005. http://eprint.iacr.org/.
-
J. Patarin and P. Camion. Design of Near-Optimal Pseudorandom Functions and Pseudorandom Permutations in the Information-Theoretic Model. Cryptology ePrint Archive, Report 2005/135, 2005. http://eprint.iacr.org/.
-
-
-
-
20
-
-
33745628759
-
-
N. Pramstaller, C. Rechberger, and V. Rijmen. Breaking a New Hash Function Design Strategy Called SMASH. In B. Preneel and S. E. Tavares, editors, Selected Areas in Cryptography - 2005, 3897 of Lectures Notes in Computer Science, pages 233-244. Springer, 2005.
-
N. Pramstaller, C. Rechberger, and V. Rijmen. Breaking a New Hash Function Design Strategy Called SMASH. In B. Preneel and S. E. Tavares, editors, Selected Areas in Cryptography - 2005, volume 3897 of Lectures Notes in Computer Science, pages 233-244. Springer, 2005.
-
-
-
-
22
-
-
33745171465
-
-
X. Wang, Y. Yin, and H. Yu. Finding Collisions in the Full SHA1. In V. Shoup, editor, Advances in Cryptology - Crypto'05, 3621 of Lectures Notes in Computer Science, pages 17-36. Springer, 2005.
-
X. Wang, Y. Yin, and H. Yu. Finding Collisions in the Full SHA1. In V. Shoup, editor, Advances in Cryptology - Crypto'05, volume 3621 of Lectures Notes in Computer Science, pages 17-36. Springer, 2005.
-
-
-
-
23
-
-
24944591357
-
-
X. Wang and H. Yu. How to Break MD5 and Other Hash Functions. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, 3494 of Lectures Notes in Computer Science, pages 19-35. Springer, 2005.
-
X. Wang and H. Yu. How to Break MD5 and Other Hash Functions. In R. Cramer, editor, Advances in Cryptology - Eurocrypt'05, volume 3494 of Lectures Notes in Computer Science, pages 19-35. Springer, 2005.
-
-
-
|