-
1
-
-
0005273217
-
-
Aiello, W., Haber, S., Venkatesan, R.: New Constructions for Secure Hash Functions. In: Vaudenay, S. (ed.) FSE 1998. LNCS, 1372, pp. 150-167. Springer, Heidelberg (1998)
-
Aiello, W., Haber, S., Venkatesan, R.: New Constructions for Secure Hash Functions. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 150-167. Springer, Heidelberg (1998)
-
-
-
-
2
-
-
33646171290
-
-
Augot, D., Finiasz, M., Sendrier, N.: A Family of Fast Syndrome Based Cryptographic Hash Functions. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, 3715, pp. 64-83. Springer, Heidelberg (2005)
-
Augot, D., Finiasz, M., Sendrier, N.: A Family of Fast Syndrome Based Cryptographic Hash Functions. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 64-83. Springer, Heidelberg (2005)
-
-
-
-
3
-
-
33746062308
-
-
ICPSS, pp
-
Bardet, M., Faugère, J.-C., Salvy, B.: On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations. In: ICPSS, pp. 71-74 (2004)
-
(2004)
On the complexity of Gröbner basis computation of semi-regular overdetermined algebraic equations
, pp. 71-74
-
-
Bardet, M.1
Faugère, J.-C.2
Salvy, B.3
-
4
-
-
33746077698
-
-
Ber bain, C., Gilbert, H., Patarin, J.: QUAD: A Practical Stream Cipher with Provable Security. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, 4004, pp. 109-128. Springer, Heidelberg (2006)
-
Ber bain, C., Gilbert, H., Patarin, J.: QUAD: A Practical Stream Cipher with Provable Security. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 109-128. Springer, Heidelberg (2006)
-
-
-
-
5
-
-
38149082935
-
-
Personal communication November 21
-
Berbain, C.: Personal communication (November 21, 2006)
-
(2006)
-
-
Berbain, C.1
-
6
-
-
38149125812
-
-
Available from
-
Bentahar, K., Page, D., Silverman, J.H., Saarinen, M.-J.O., Smart, N., LASH (2006) Available from: http://csrc.nist.gov/pki/HashWorkshop/2006/
-
(2006)
-
-
Bentahar, K.1
Page, D.2
Silverman, J.H.3
Saarinen, M.-J.O.4
Smart, N.5
LASH6
-
7
-
-
50449107349
-
Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Black, J., Rogaway, P., Shrimpton, T.: Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320-335. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 320-335
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
8
-
-
33746095782
-
VSH, an Efficient and Provable Collision-Resistant Hash Function
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Contini, S., Lenstra, A.K., Steinfeld, R.: VSH, an Efficient and Provable Collision-Resistant Hash Function. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 165-182. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 165-182
-
-
Contini, S.1
Lenstra, A.K.2
Steinfeld, R.3
-
9
-
-
84981199109
-
A Design Principle for Hash Functions
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Damgård, I.: A Design Principle for Hash Functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 416-427
-
-
Damgård, I.1
-
10
-
-
26444529947
-
-
Ding, J., Schmidt, D.: Rainbow, a New Multivariable Polynomial Signature Scheme. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, 3531, pp. 164-175. Springer, Heidelberg (2005)
-
Ding, J., Schmidt, D.: Rainbow, a New Multivariable Polynomial Signature Scheme. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 164-175. Springer, Heidelberg (2005)
-
-
-
-
11
-
-
24944454273
-
Differential cryptanalysis for multivariate schemes
-
Cramer, R.J.F, ed, EUROCKYPT 2005, Springer, Heidelberg
-
Fouque, P.-A., Granboulan, L., Stern, J.: Differential cryptanalysis for multivariate schemes. In: Cramer, R.J.F. (ed.) EUROCKYPT 2005. LNCS, vol. 3494, pp. 341-353. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 341-353
-
-
Fouque, P.-A.1
Granboulan, L.2
Stern, J.3
-
12
-
-
0001908618
-
Complexity of Problems in Games, Graphs, and Algebraic Equations
-
Fraenkel, A.S., Yesha, Y.: Complexity of Problems in Games, Graphs, and Algebraic Equations. Discr. Appl. Math. 1, 15-30 (1979)
-
(1979)
Discr. Appl. Math
, vol.1
, pp. 15-30
-
-
Fraenkel, A.S.1
Yesha, Y.2
-
14
-
-
33645780237
-
Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
-
Franklin, M.k, ed, CRYPTO 2004, Springer, Heidelberg
-
Joux, A.: Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions. In: Franklin, M.k. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 306-316. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 306-316
-
-
Joux, A.1
-
15
-
-
24944541563
-
n Work
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
n Work. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 474-490. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 474-490
-
-
Kelsey, J.1
Schneier, B.2
-
16
-
-
84957693117
-
Unbalanced Oil and Vinegar Signature Schemes
-
Stern, J, ed, EUROCRYPT 1999, Springer, Heidelberg
-
Kipnis, A., Patarin, J., Goubin, L.: Unbalanced Oil and Vinegar Signature Schemes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 206-222. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 206-222
-
-
Kipnis, A.1
Patarin, J.2
Goubin, L.3
-
17
-
-
84887288554
-
Discrete logarithm variants of VSH
-
Nguyen, P.Q, ed, VIETCRYPT 2006, Springer, Heidelberg
-
Lenstra, A.K., Page, D., Stam, M.: Discrete logarithm variants of VSH. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 229-242. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4341
, pp. 229-242
-
-
Lenstra, A.K.1
Page, D.2
Stam, M.3
-
19
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., Vanstone, S.A., Van Oorschot, P.C.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Van Oorschot, P.C.3
-
20
-
-
84937461306
-
One Way Hash Functions and DES
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C.: One Way Hash Functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1989)
-
(1989)
LNCS
, vol.435
, pp. 428-446
-
-
Merkle, R.C.1
-
21
-
-
34547695808
-
-
National Institute of Standards and Technology, Standard November, Available from
-
National Institute of Standards and Technology. FIPS 197: Advanced Encryption Standard (November 2001) Available from: http://csrc.nist.gov
-
(2001)
FIPS 197: Advanced Encryption
-
-
-
22
-
-
34548097377
-
-
National Institute of Standards and Technology, Standard August
-
National Institute of Standards and Technology. FIPS 180-2: Secure Hash Standard (August 2002) http://csrc.nist.gov
-
(2002)
FIPS 180-2: Secure Hash
-
-
-
23
-
-
84947932132
-
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
-
Maurer, U.M, ed, EU-ROCRYPT 1996, Springer, Heidelberg
-
Patarin, J.: Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms. In: Maurer, U.M. (ed.) EU-ROCRYPT 1996. LNCS, vol. 1070, pp. 33-48. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1070
, pp. 33-48
-
-
Patarin, J.1
-
24
-
-
84937576636
-
-
Patarin, J., Courtois, N.T., Goubin, L.: QUARTZ, 128-Bit Long Digital Signatures. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, 2020, pp. 282-297. Springer, Heidelberg (2001)
-
Patarin, J., Courtois, N.T., Goubin, L.: QUARTZ, 128-Bit Long Digital Signatures. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 282-297. Springer, Heidelberg (2001)
-
-
-
-
25
-
-
84937571034
-
-
Patarin, J., Courtois, N.T., Goubin, L.: FLASH, a Fast Multivariate Signature Algorithm. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, 2020, pp. 298-307. Springer, Heidelberg (2001)
-
Patarin, J., Courtois, N.T., Goubin, L.: FLASH, a Fast Multivariate Signature Algorithm. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 298-307. Springer, Heidelberg (2001)
-
-
-
-
26
-
-
38149022185
-
Combining Compression Functions and Block Cipher-based Hash Functions
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Peyrin, T., Gilbert, H., Muller, F., Robshaw, M.J.B.: Combining Compression Functions and Block Cipher-based Hash Functions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 315-331. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 315-331
-
-
Peyrin, T.1
Gilbert, H.2
Muller, F.3
Robshaw, M.J.B.4
-
29
-
-
38149123597
-
-
Rivest, R.L.: RFC 1321: The MD5 Message-Digest Algorithm (April 1992) http://www.ietf.org/rfc/rfc1321.txt
-
Rivest, R.L.: RFC 1321: The MD5 Message-Digest Algorithm (April 1992) http://www.ietf.org/rfc/rfc1321.txt
-
-
-
-
30
-
-
85028916857
-
Response to Comments of the NIST Proposed Digital Signature Standard
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Smid, M.E., Branstad, D.K.: Response to Comments of the NIST Proposed Digital Signature Standard. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 76-88. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 76-88
-
-
Smid, M.E.1
Branstad, D.K.2
-
31
-
-
84958969583
-
Solving Underdefined Systems of Multivariate Quadratic Equations
-
Courtois, N., Goubin, L., Meier, W., Tacier, J.-D.: Solving Underdefined Systems of Multivariate Quadratic Equations. Public Key Cryptography, 211-227 (2002)
-
(2002)
Public Key Cryptography
, pp. 211-227
-
-
Courtois, N.1
Goubin, L.2
Meier, W.3
Tacier, J.-D.4
-
32
-
-
38149070465
-
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Ziarko, W., Yao, Y. (eds.) RSCTC 2000. LNCS (LNAI), 2005, pp. 17-36. Springer, Heidelberg (2001)
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Ziarko, W., Yao, Y. (eds.) RSCTC 2000. LNCS (LNAI), vol. 2005, pp. 17-36. Springer, Heidelberg (2001)
-
-
-
-
33
-
-
24944591357
-
How to Break MD5 and Other Hash Functions
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
34
-
-
38149043728
-
-
based on the problem of Multivariate Quadratic equations
-
Wolf, C., Preneel, B.: Taxonomy of Public Key Schemes based on the problem of Multivariate Quadratic equations, http://eprint.iacr.org/
-
Taxonomy of Public Key Schemes
-
-
Wolf, C.1
Preneel, B.2
|