-
1
-
-
0029719917
-
Generating hard instances of lattice problems
-
Ajtai, M.: Generating hard instances of lattice problems. In: STOC, pp. 99-108 (1996)
-
(1996)
STOC
, pp. 99-108
-
-
Ajtai, M.1
-
2
-
-
84985824733
-
FFT hashing is not collision-free
-
Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
-
Baritaud, T., Gilbert, H., Girault, M.: FFT hashing is not collision-free. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 35-44. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.658
, pp. 35-44
-
-
Baritaud, T.1
Gilbert, H.2
Girault, M.3
-
3
-
-
50249109126
-
-
Bentahar, K., Page, D., Silverman, J., Saarinen, M., Smart, N.: Lash. Technical report, 2nd NIST Cryptographic Hash Function Workshop (2006)
-
Bentahar, K., Page, D., Silverman, J., Saarinen, M., Smart, N.: Lash. Technical report, 2nd NIST Cryptographic Hash Function Workshop (2006)
-
-
-
-
4
-
-
24944584156
-
-
Biham, E., Chen, R., Joux, A., Carribault, P., Jalby, W., Lemuet, C.: Collisions of SHA-0 and reduced SHA-1. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, 3494. Springer, Heidelberg (2005)
-
Biham, E., Chen, R., Joux, A., Carribault, P., Jalby, W., Lemuet, C.: Collisions of SHA-0 and reduced SHA-1. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494. Springer, Heidelberg (2005)
-
-
-
-
5
-
-
24144453496
-
Noise-tolerant learning, the parity problem, and the statistical query model
-
Blum, A., Kalai, A., Wasserman, H.: Noise-tolerant learning, the parity problem, and the statistical query model. Journal of the ACM 50(4), 506-519 (2003)
-
(2003)
Journal of the ACM
, vol.50
, Issue.4
, pp. 506-519
-
-
Blum, A.1
Kalai, A.2
Wasserman, H.3
-
6
-
-
0031377422
-
An improved worst-case to average-case connection for lattice problems
-
Cai, J., Nerurkar, A.: An improved worst-case to average-case connection for lattice problems. In: FOCS, pp. 468-477 (1997)
-
(1997)
FOCS
, pp. 468-477
-
-
Cai, J.1
Nerurkar, A.2
-
7
-
-
84985833502
-
The knapsack hash function proposed at Crypto 1989 can be broken
-
Quisquater, J.-J, Vandewalle, J, eds, EUROCRYPT 1989, Springer, Heidelberg
-
Camion, P., Patarin, J.: The knapsack hash function proposed at Crypto 1989 can be broken. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 39-53. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.434
, pp. 39-53
-
-
Camion, P.1
Patarin, J.2
-
8
-
-
50249093423
-
Cryptanalysis of LASH. Cryptology ePrint Archive
-
Report 2007/430
-
Contini, S., Matusiewicz, K., Pieprzyk, J., Steinfeld, R., Guo, J., Ling, S., Wang, H.: Cryptanalysis of LASH. Cryptology ePrint Archive, Report 2007/430 (2007), http://eprint.iacr.org/
-
(2007)
-
-
Contini, S.1
Matusiewicz, K.2
Pieprzyk, J.3
Steinfeld, R.4
Guo, J.5
Ling, S.6
Wang, H.7
-
9
-
-
84985811749
-
-
Daemen, J., Bosselaers, A., Govaerts, R., Vandewalle, J.: Collisions for Schnorr's hash function FFT-hash presented at crypto 1991. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, 739. Springer, Heidelberg (1993)
-
Daemen, J., Bosselaers, A., Govaerts, R., Vandewalle, J.: Collisions for Schnorr's hash function FFT-hash presented at crypto 1991. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol. 739. Springer, Heidelberg (1993)
-
-
-
-
10
-
-
84981199109
-
A design principle for hash functions
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Damgård, I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 416-427
-
-
Damgård, I.1
-
11
-
-
35248871591
-
Collision-free hashing from lattice problems
-
Technical Report TR-42, ECCC
-
Goldreich, O., Goldwasser, S., Halevi, S.: Collision-free hashing from lattice problems. Technical Report TR-42, ECCC (1996)
-
(1996)
-
-
Goldreich, O.1
Goldwasser, S.2
Halevi, S.3
-
12
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792-807 (1986)
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
13
-
-
84947808606
-
-
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A ring-based public key cryptosystem. In: ANTS, pp. 267-288 (1998)
-
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A ring-based public key cryptosystem. In: ANTS, pp. 267-288 (1998)
-
-
-
-
14
-
-
33646188704
-
A practical attack against knapsack based hash functions (extended abstract)
-
De Santis, A, ed, EUROCRYPT 1994, Springer, Heidelberg
-
Joux, A., Granboulan, L.: A practical attack against knapsack based hash functions (extended abstract). In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 58-66. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.950
, pp. 58-66
-
-
Joux, A.1
Granboulan, L.2
-
15
-
-
26944487960
-
The parity problem in the presence of noise, decoding random linear codes, and the subset sum problem
-
Chekuri, C, Jansen, K, Rolim, J.D.P, Trevisan, L, eds, APPROX 2005 and RANDOM 2005, Springer, Heidelberg
-
Lyubashevsky, V.: The parity problem in the presence of noise, decoding random linear codes, and the subset sum problem. In: Chekuri, C., Jansen, K., Rolim, J.D.P., Trevisan, L. (eds.) APPROX 2005 and RANDOM 2005. LNCS, vol. 3624, pp. 378-389. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3624
, pp. 378-389
-
-
Lyubashevsky, V.1
-
16
-
-
33746342484
-
Generalized compact knapsacks are collision resistant
-
Bugliesi, M, Preneel, B, Sassone, V, Wegener, I, eds, ICALP 2006, Springer, Heidelberg
-
Lyubashevsky, V., Micciancio, D.: Generalized compact knapsacks are collision resistant. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, pp. 144-155. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4052
, pp. 144-155
-
-
Lyubashevsky, V.1
Micciancio, D.2
-
17
-
-
16244401113
-
Almost perfect lattices, the covering radius problem, and applications to Ajtai's connection factor
-
Micciancio, D.: Almost perfect lattices, the covering radius problem, and applications to Ajtai's connection factor. SIAM J. on Computing 34(1), 118-169 (2004)
-
(2004)
SIAM J. on Computing
, vol.34
, Issue.1
, pp. 118-169
-
-
Micciancio, D.1
-
18
-
-
38749089099
-
-
Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient oneway functions from worst-case complexity assumptions. Computational Complexity 16, 365-411 (2007); Preliminary version in FOCS 2002
-
Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient oneway functions from worst-case complexity assumptions. Computational Complexity 16, 365-411 (2007); Preliminary version in FOCS 2002
-
-
-
-
19
-
-
38749097694
-
Worst-case to average-case reductions based on Gaussian measures
-
Micciancio, D., Regev, O.: Worst-case to average-case reductions based on Gaussian measures. SIAM J. on Computing 37(1), 267-302 (2007)
-
(2007)
SIAM J. on Computing
, vol.37
, Issue.1
, pp. 267-302
-
-
Micciancio, D.1
Regev, O.2
-
20
-
-
33746766947
-
-
Nguyen, P., Stehlé, D.: LLL on the average. In: ANTS, pp. 238-256 (2006)
-
Nguyen, P., Stehlé, D.: LLL on the average. In: ANTS, pp. 238-256 (2006)
-
-
-
-
21
-
-
50249126083
-
-
Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, 3876. Springer, Heidelberg (2006)
-
Peikert, C., Rosen, A.: Efficient collision-resistant hashing from worst-case assumptions on cyclic lattices. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876. Springer, Heidelberg (2006)
-
-
-
-
23
-
-
35048855067
-
-
Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 371-388. Springer, Heidelberg (2004)
-
Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371-388. Springer, Heidelberg (2004)
-
-
-
-
24
-
-
50249143624
-
FFT-hash, an efficient cryptographic hash function
-
Schnorr, C.P.: FFT-hash, an efficient cryptographic hash function. In: Crypto Rump Session (1991)
-
(1991)
Crypto Rump Session
-
-
Schnorr, C.P.1
-
25
-
-
85034198204
-
FFT-Hash II, efficient cryptographic hashing
-
Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
-
Schnorr, C.P.: FFT-Hash II, efficient cryptographic hashing. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 45-54. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.658
, pp. 45-54
-
-
Schnorr, C.P.1
-
26
-
-
50249183028
-
Serge Vaudenay. Parallel FFT-hashing
-
Schnorr, C.P.: Serge Vaudenay. Parallel FFT-hashing. In: Fast Software Encryption, pp. 149-156 (1993)
-
(1993)
Fast Software Encryption
, pp. 149-156
-
-
Schnorr, C.P.1
-
27
-
-
84985833529
-
FFT-Hash-II is not yet collision-free
-
Brickell, E.F, ed, CRYPTO 1992, Springer, Heidelberg
-
Vaudenay, S.: FFT-Hash-II is not yet collision-free. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 587-593. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 587-593
-
-
Vaudenay, S.1
-
28
-
-
84937428040
-
A generalized birthday problem
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Wagner, D.: A generalized birthday problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288-303. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 288-303
-
-
Wagner, D.1
-
29
-
-
24944575304
-
Cryptanalysis for hash functions MD4 and RIPEMD
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis for hash functions MD4 and RIPEMD. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
30
-
-
24944591357
-
How to break MD5 and other hash functions
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
-
-
Wang, X.1
Yu, H.2
|