-
1
-
-
35048892549
-
Near-Collisions of SHA-O
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Biham, E., Chen, R.: Near-Collisions of SHA-O. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290-305. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 290-305
-
-
Biham, E.1
Chen, R.2
-
2
-
-
33746706791
-
-
Black, J., Cochran, M., Highland, T.: A Study of the MD5 Attacks: Insights and Improvements. In: Robshaw, M. (ed.) FSE 2006. LNCS, 4047, pp. 262-277. Springer, Heidelberg (2006)
-
Black, J., Cochran, M., Highland, T.: A Study of the MD5 Attacks: Insights and Improvements. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 262-277. Springer, Heidelberg (2006)
-
-
-
-
3
-
-
77649243367
-
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Contini, S., Yin, Y.L.: Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
-
-
Contini, S.1
Yin, Y.L.2
-
4
-
-
38049111724
-
EUROCRYPT 2005
-
Cramer, R.J.F, ed, Springer, Heidelberg
-
Cramer, R.J.F. (ed.): EUROCRYPT 2005. LNCS, vol. 3494. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
-
-
-
6
-
-
38149099120
-
-
Daum, M., Lucks, S.: Hash Collisions (The Poisoned Message Attack) The Story of Alice and her Boss. Presented at the rump session of Eurocrypt '05. http://th.informatik.unl-marinheim.de/people/lucks/ HashCollisions/
-
Daum, M., Lucks, S.: Hash Collisions (The Poisoned Message Attack) "The Story of Alice and her Boss". Presented at the rump session of Eurocrypt '05. http://th.informatik.unl-marinheim.de/people/lucks/ HashCollisions/
-
-
-
-
7
-
-
0005268716
-
Cryptanalysis of MD4
-
Dobbertin, H.: Cryptanalysis of MD4. J. Cryptology 11(4), 253-271 (1998)
-
(1998)
J. Cryptology
, vol.11
, Issue.4
, pp. 253-271
-
-
Dobbertin, H.1
-
8
-
-
77952415887
-
-
Gebhardt, M., Iilies, G., Schindler, W.: A Note on the Practical Value of Single Hash Collisions for Special File Formats.In: Dittmann, J. (ed.) Sicherheit, 77 of LNI, pp. 333-344. GI (2006)
-
Gebhardt, M., Iilies, G., Schindler, W.: A Note on the Practical Value of Single Hash Collisions for Special File Formats.In: Dittmann, J. (ed.) Sicherheit, vol. 77 of LNI, pp. 333-344. GI (2006)
-
-
-
-
9
-
-
33750029023
-
-
Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 242-256. Springer, Heidelberg (2006)
-
Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 242-256. Springer, Heidelberg (2006)
-
-
-
-
10
-
-
33746036727
-
Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications. Cryptology ePrint Archive
-
Report 2005/102
-
Klima, V.: Finding MD5 Collisions on a Notebook PC Using Multi-message Modifications. Cryptology ePrint Archive, Report 2005/102 (2005), http ://eprint.iacr.org/
-
(2005)
-
-
Klima, V.1
-
11
-
-
34548114558
-
Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive
-
Report 2006/105
-
Klima, V.: Tunnels in Hash Functions: MD5 Collisions Within a Minute. Cryptology ePrint Archive, Report 2006/105 (2006), http://eprint.iacr.org/
-
(2006)
-
-
Klima, V.1
-
12
-
-
26444521554
-
-
Lenstra, A.K., Weger, B.d.: On the Possibility of Constructing Meaningful Hash Collisions for Public Keys.. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, 3574, pp. 267-279. Springer, Heidelberg (2005)
-
Lenstra, A.K., Weger, B.d.: On the Possibility of Constructing Meaningful Hash Collisions for Public Keys.. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 267-279. Springer, Heidelberg (2005)
-
-
-
-
13
-
-
38149040776
-
-
Myers, J, Rose, M, Post Office Protocol, Version 3. RFC 1939 (Standard, May 1996) Updated by RFCs 1957, 2449
-
Myers, J., Rose, M.: Post Office Protocol - Version 3. RFC 1939 (Standard) (May 1996) Updated by RFCs 1957, 2449.
-
-
-
-
14
-
-
33745822369
-
-
Naito, Y., Sasaki, Y., Kunihiro, N., Ohta, K.: Improved Collision Attack on MD4 with Probability Almost 1. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, 3935, pp. 129-145. Springer, Heidelberg (2006)
-
Naito, Y., Sasaki, Y., Kunihiro, N., Ohta, K.: Improved Collision Attack on MD4 with Probability Almost 1. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 129-145. Springer, Heidelberg (2006)
-
-
-
-
15
-
-
84947934697
-
-
Preneel, B., van Oorschot, P.C.: On the Security of Two MAC Algorithms. In: EUROCRYPT, pp. 19-32 (1996)
-
Preneel, B., van Oorschot, P.C.: On the Security of Two MAC Algorithms. In: EUROCRYPT, pp. 19-32 (1996)
-
-
-
-
16
-
-
38149064346
-
Practical password recovery on an md5 challenge and response. Cryptology ePrint Archive
-
Report 2007/101
-
Sasaki, Y., Yamamoto, G., Aoki, K.: Practical password recovery on an md5 challenge and response. Cryptology ePrint Archive, Report 2007/101(2007), http://eprint.iacr.org/
-
(2007)
-
-
Sasaki, Y.1
Yamamoto, G.2
Aoki, K.3
-
17
-
-
38149141484
-
CRYPTO 2005
-
Shoup, V, ed, Springer, Heidelberg
-
Shoup, V. (ed.): CRYPTO 2005. LNCS, vol. 3621, pp. 14-18. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 14-18
-
-
-
18
-
-
38149060942
-
Fast Collision Attack on MD5. Cryptology ePrint Archive
-
Report 2006/104
-
Stevens, M.: Fast Collision Attack on MD5. Cryptology ePrint Archive, Report 2006/104 (2006), http://eprint.iacr.org/
-
(2006)
-
-
Stevens, M.1
-
19
-
-
38149102293
-
Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities. Cryptology ePrint Archive
-
Report 2006/360
-
Stevens, M., Lenstra, A., de Weger, B.: Target Collisions for MD5 and Colliding X.509 Certificates for Different Identities. Cryptology ePrint Archive, Report 2006/360 (2006), http://eprint.iacr.org/
-
(2006)
-
-
Stevens, M.1
Lenstra, A.2
de Weger, B.3
-
20
-
-
33745677802
-
-
Szydlo, M., Yin, Y.L.: Collision-Resistant Usage of MD5 and SHA-I Via Message Preprocessing. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, 3860, pp. 99-114. Springer, Heidelberg (2006)
-
Szydlo, M., Yin, Y.L.: Collision-Resistant Usage of MD5 and SHA-I Via Message Preprocessing. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 99-114. Springer, Heidelberg (2006)
-
-
-
-
21
-
-
24944575304
-
-
Cramer [4, pp
-
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer [4], pp. 1-18.
-
Cryptanalysis of the Hash Functions MD4 and RIPEMD
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
22
-
-
38149118788
-
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-I. In: Shoup [17], pp. 17-36 (2005)
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-I. In: Shoup [17], pp. 17-36 (2005)
-
-
-
-
24
-
-
38149048320
-
-
Wang, X., Yu, H., Yin, Y.L.: Efficient Collision Search Attacks on SHA-O. In: Shoup [17], pp. 1-16 (2005)
-
Wang, X., Yu, H., Yin, Y.L.: Efficient Collision Search Attacks on SHA-O. In: Shoup [17], pp. 1-16 (2005)
-
-
-
-
25
-
-
33744827107
-
-
Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, 3810, pp. 1-12. Springer, Heidelberg (2005)
-
Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 1-12. Springer, Heidelberg (2005)
-
-
-
|