메뉴 건너뛰기




Volumn 4833 LNCS, Issue , 2007, Pages 536-550

Cryptanalysis of the tiger hash function

Author keywords

Collision; Cryptanalysis; Differential attack; Hash functions; Near collision; Pseudo collision; Pseudo near collision

Indexed keywords

COMPUTATIONAL COMPLEXITY; DATA REDUCTION; FUNCTION EVALUATION; SECURITY OF DATA;

EID: 38149133737     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-76900-2_33     Document Type: Conference Paper
Times cited : (20)

References (4)
  • 1
    • 70350162850 scopus 로고    scopus 로고
    • TIGER: A Fast New Hash Function
    • Gollmann, D, ed, Fast Software Encryption, Springer, Heidelberg
    • Anderson, R.J, Biham, E.: TIGER: A Fast New Hash Function. In: Gollmann, D. (ed.) Fast Software Encryption. LNCS, vol. 1039, pp. 89-97. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1039 , pp. 89-97
    • Anderson, R.J.1    Biham, E.2
  • 2
    • 33746742309 scopus 로고    scopus 로고
    • Kelsey, J. Lucks, S.: Collisions and Near-Collisions for Reduced-Round Tiger. In: Robshaw, M. (ed.) FSE 2006. LNCS, 4047, pp. 111-125. Springer, Heidelberg (2006)
    • Kelsey, J. Lucks, S.: Collisions and Near-Collisions for Reduced-Round Tiger. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 111-125. Springer, Heidelberg (2006)
  • 3
    • 38149053275 scopus 로고    scopus 로고
    • Update on Tiger
    • Barua, R, Lange, T, eds, INDOCRYPT 2006, Springer, Heidelberg
    • Mendel, F., Preneel, B., Rijmen, V., Yoshida, H., Watanabe, D.: Update on Tiger. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 63-79. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4329 , pp. 63-79
    • Mendel, F.1    Preneel, B.2    Rijmen, V.3    Yoshida, H.4    Watanabe, D.5
  • 4
    • 33646824396 scopus 로고    scopus 로고
    • Pramstaller, N., Rechberger, C., Rijmen, V.: Exploiting Coding Theory for Collision Attacks on SHA-1. In: Smart, N.P. (ed.) Cryptography and Coding. LNCS, 3796, pp. 78-95. Springer, Heidelberg (2005)
    • Pramstaller, N., Rechberger, C., Rijmen, V.: Exploiting Coding Theory for Collision Attacks on SHA-1. In: Smart, N.P. (ed.) Cryptography and Coding. LNCS, vol. 3796, pp. 78-95. Springer, Heidelberg (2005)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.