-
1
-
-
33749544409
-
New proofs for NMAC and HMAC Security without collision-resistance
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Bellare, M.: New proofs for NMAC and HMAC Security without collision-resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602-619. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 602-619
-
-
Bellare, M.1
-
2
-
-
35048891868
-
Keyed Hash Functions for Message Authentication
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Bellare, M., Canetti, R., Krawczyk, H.: Keyed Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
77649268663
-
Multi-Property-Preserving Hash Domain Extension and the EMD Transform
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Bellare, M., Ristenpart, T.: Multi-Property-Preserving Hash Domain Extension and the EMD Transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 299-314. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 299-314
-
-
Bellare, M.1
Ristenpart, T.2
-
4
-
-
35048892549
-
Near-Collisions of SHA-0
-
Franklin, M, ed, CRYPTO 2004, Springer, Heidelberg
-
Biham, E., Chen, R.: Near-Collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290-305. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 290-305
-
-
Biham, E.1
Chen, R.2
-
6
-
-
33745119040
-
Merkle-damgard revisited: How to construct a Hash Function
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Coron, J.S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-damgard revisited: How to construct a Hash Function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430-448. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 430-448
-
-
Coron, J.S.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
7
-
-
84981199109
-
A design principle for hash functions
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Damgå, I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 416-427
-
-
Damgå, I.1
-
9
-
-
33746354987
-
-
Gauravaram, P., Millan, W., Neito, J.G., Dawson, E.: Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. In: Batten, L.M., SafaviNaini, R. (eds.) ACISP 2006. LNCS, 4058, pp. 407-420. Springer, Heidelberg (2006)
-
Gauravaram, P., Millan, W., Neito, J.G., Dawson, E.: Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. In: Batten, L.M., SafaviNaini, R. (eds.) ACISP 2006. LNCS, vol. 4058, pp. 407-420. Springer, Heidelberg (2006)
-
-
-
-
10
-
-
33646776051
-
A Failure-Friendly Design Principle for Hash Functions
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Lucks, S.: A Failure-Friendly Design Principle for Hash Functions. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 474-494. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 474-494
-
-
Lucks, S.1
-
11
-
-
35048817517
-
-
Maurer, U., Renner, R., Holenstein, C.: Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 21-39. Springer, Heidelberg (2004)
-
Maurer, U., Renner, R., Holenstein, C.: Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 21-39. Springer, Heidelberg (2004)
-
-
-
-
12
-
-
84937461306
-
One Way Hash Functions and DES
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C.: One Way Hash Functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 428-446
-
-
Merkle, R.C.1
-
13
-
-
24944591357
-
How to Break MD5 and Other Hash Functions
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
|