-
1
-
-
77649268663
-
Multi-property-preserving hash domain extension and the EMD transform
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Bellare, M., Ristenpart, T.: Multi-property-preserving hash domain extension and the EMD transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 299-314. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 299-314
-
-
Bellare, M.1
Ristenpart, T.2
-
2
-
-
50449107349
-
Black-box analysis of the block-cipher-based hash-function constructions from PGV
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Black, J.R., Rogaway, P., Shrimpton, T.: Black-box analysis of the block-cipher-based hash-function constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320-335. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 320-335
-
-
Black, J.R.1
Rogaway, P.2
Shrimpton, T.3
-
3
-
-
0013058662
-
Data authentication using modification dectection codes based on a public one way encryption function
-
U.S. Patent No. 4,908,861 March 13
-
Coppersmith, D., Pilpel, S., Meyer, C.H., Matyas, S.M., Hyden, M.M., Oseas, J., Brachtl, B., Schilling, M.: Data authentication using modification dectection codes based on a public one way encryption function. U.S. Patent No. 4,908,861 (March 13, 1990)
-
(1990)
-
-
Coppersmith, D.1
Pilpel, S.2
Meyer, C.H.3
Matyas, S.M.4
Hyden, M.M.5
Oseas, J.6
Brachtl, B.7
Schilling, M.8
-
4
-
-
33745119040
-
Merkle-Damgard revisited: How to construct a hash function
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgard revisited: How to construct a hash function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430-448. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 430-448
-
-
Coron, J.-S.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
5
-
-
84981199109
-
A design principle for hash functions
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Damg̊rd, I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 416-427
-
-
Damg̊rd, I.1
-
6
-
-
24944500380
-
-
Hirose, S.: Provably secure double-block-length hash functions in a black-box model. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, 3506, pp. 330-342. Springer, Heidelberg (2005)
-
Hirose, S.: Provably secure double-block-length hash functions in a black-box model. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 330-342. Springer, Heidelberg (2005)
-
-
-
-
7
-
-
38149010229
-
-
Hirose, S.: In: Robshaw, M. (ed.) FSE 2006. LNCS, 4047, Springer, Heidelberg (2006)
-
Hirose, S.: In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, Springer, Heidelberg (2006)
-
-
-
-
8
-
-
33645780237
-
-
Joux, A.: Multicollisions in iterated hash functions. application to cascaded constructions. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, 3152, pp. 306-316. Springer, Heidelberg (2004)
-
Joux, A.: Multicollisions in iterated hash functions. application to cascaded constructions. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 306-316. Springer, Heidelberg (2004)
-
-
-
-
9
-
-
24944541563
-
n work
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
n work. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 474-490. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 474-490
-
-
Kelsey, J.1
Schneier, B.2
-
10
-
-
35248889035
-
New attacks on all double block length hash functions of hash rate 1, including the parallel-DM
-
De Santis, A, ed, EUROCRYPT 1994, Springer, Heidelberg
-
Knudsen, L.R, Lai, X.: New attacks on all double block length hash functions of hash rate 1, including the parallel-DM. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 410-418. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.950
, pp. 410-418
-
-
Knudsen, L.R.1
Lai, X.2
-
11
-
-
33646815676
-
Some attacks against a double length hash proposal
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Knudsen, L.R., Muller, F.: Some attacks against a double length hash proposal. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 462-473. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 462-473
-
-
Knudsen, L.R.1
Muller, F.2
-
12
-
-
84941161050
-
-
Knudsen, L.R., Preneel, B.: Hash functions based on block ciphers and quaternary codes. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, 1163, pp. 77-90. Springer, Heidelberg (1996)
-
Knudsen, L.R., Preneel, B.: Hash functions based on block ciphers and quaternary codes. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 77-90. Springer, Heidelberg (1996)
-
-
-
-
13
-
-
84958591161
-
Fast and secure hashing based on codes
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Knudsen, L.R., Preneel, B.: Fast and secure hashing based on codes. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 485-498. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 485-498
-
-
Knudsen, L.R.1
Preneel, B.2
-
14
-
-
0036714381
-
Construction of secure and fast hash functions using nonbinary error-correcting codes
-
Knudsen, L.R., Preneel, B.: Construction of secure and fast hash functions using nonbinary error-correcting codes. IEEE Transactions on Information Theory 48(9), 2524-2539 (2002)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
, pp. 2524-2539
-
-
Knudsen, L.R.1
Preneel, B.2
-
15
-
-
84985820553
-
Hash function based on block ciphers
-
Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
-
Lai, X., Massey, J.L.: Hash function based on block ciphers. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 55-70. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.658
, pp. 55-70
-
-
Lai, X.1
Massey, J.L.2
-
16
-
-
84957799016
-
Security of iterated hash functions based on block ciphers
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Lai, X., Waldvogel, C., Hohl, W., Meier, T.: Security of iterated hash functions based on block ciphers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 379-390. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 379-390
-
-
Lai, X.1
Waldvogel, C.2
Hohl, W.3
Meier, T.4
-
18
-
-
84937461306
-
One way hash functions and DES
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 428-446
-
-
Merkle, R.C.1
-
20
-
-
26444539878
-
-
Nandi, M., Lee, W., Sakurai, K., Lee, S.: Security analysis of a 2/3-rate double length compression function in black-box model. In; Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, 3557, pp. 243-254. Springer, Heidelberg (2005)
-
Nandi, M., Lee, W., Sakurai, K., Lee, S.: Security analysis of a 2/3-rate double length compression function in black-box model. In; Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 243-254. Springer, Heidelberg (2005)
-
-
-
-
21
-
-
38149022185
-
Combining compression functions and block cipher-based hash functions
-
Lai, X, Chen, K, eds, ASI-ACRYPT 2006, Springer, Heidelberg
-
Peyrin, T., Gilbert, H., Muller, F., Robshaw, M.J.B.: Combining compression functions and block cipher-based hash functions. In: Lai, X., Chen, K. (eds.) ASI-ACRYPT 2006. LNCS, vol. 4284, pp. 315-331. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 315-331
-
-
Peyrin, T.1
Gilbert, H.2
Muller, F.3
Robshaw, M.J.B.4
-
22
-
-
0024890759
-
Collision-free hash functions based on block cipher algorithms
-
IEEE catalog number 89CH2774-8, pp
-
Preneel, B., Bosselaers, A., Govaerts, R., Vandewalle, J.: Collision-free hash functions based on block cipher algorithms. In: Proceedings, International Carnahan Conference on Security Technology, IEEE 1989, IEEE catalog number 89CH2774-8, pp. 203-210 (1989)
-
(1989)
Proceedings, International Carnahan Conference on Security Technology, IEEE
, pp. 203-210
-
-
Preneel, B.1
Bosselaers, A.2
Govaerts, R.3
Vandewalle, J.4
-
23
-
-
85026897539
-
Hash functions based on block ciphers: A synthetic approach
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Preneel, B., Govaerts, R., Vandewalle, J.: Hash functions based on block ciphers: A synthetic approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 368-378. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 368-378
-
-
Preneel, B.1
Govaerts, R.2
Vandewalle, J.3
-
24
-
-
84985801328
-
2n-bit hash-functions using n-bit symmetric block cipher algorithms
-
Quisquater, J.-J, Vandewalle, J, eds, EUROCRYPT 1989, Springer, Heidelberg
-
Quisquater, J.-J., Girault, M.: 2n-bit hash-functions using n-bit symmetric block cipher algorithms. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 102-109. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.434
, pp. 102-109
-
-
Quisquater, J.-J.1
Girault, M.2
-
25
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal 28(4), 656-715 (1949)
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
-
26
-
-
84937428040
-
A generalized birthday problem
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Wagner, D.: A generalized birthday problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288-303. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 288-303
-
-
Wagner, D.1
-
27
-
-
33745171465
-
-
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
-
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
-
-
-
-
28
-
-
24944591357
-
How to break MD5 and other hash functions
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
29
-
-
0021140198
-
A secure one-way hash function built from DES
-
IEEE Computer Society Press, Los Alamitos
-
Winternitz, R.S.: A secure one-way hash function built from DES. In: IEEE Symposium on Security and Privacy, pp. 88-90. IEEE Computer Society Press, Los Alamitos (1984)
-
(1984)
IEEE Symposium on Security and Privacy
, pp. 88-90
-
-
Winternitz, R.S.1
|