-
1
-
-
30744457437
-
Hash function balance and its impact on birthday attacks
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Bellare, M., Kohno, T.: Hash function balance and its impact on birthday attacks. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 401-418. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 401-418
-
-
Bellare, M.1
Kohno, T.2
-
2
-
-
24944511624
-
On the impossibility of highly efficient blockcipher-based hash functions
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Black, J., Cochran, M., Shrimpton, T.: On the impossibility of highly efficient blockcipher-based hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 526-541. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 526-541
-
-
Black, J.1
Cochran, M.2
Shrimpton, T.3
-
3
-
-
50449107349
-
Black-box analysis of the block-cipher-based hashfunction constructions from PGV
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Black, J., Rogaway, P., Shrimpton, T.: Black-box analysis of the block-cipher-based hashfunction constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
4
-
-
84981199109
-
A design principle for hash functions
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Damgård, I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
-
-
Damgård, I.1
-
5
-
-
33746721457
-
-
Hirose, S.: Some plausible constructions of double-length hash functions. In: Robshaw, M. (ed.) FSE 2006. LNCS, 4047, pp. 210-225. Springer, Heidelberg (2006)
-
Hirose, S.: Some plausible constructions of double-length hash functions. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 210-225. Springer, Heidelberg (2006)
-
-
-
-
7
-
-
33646815676
-
Some attacks against a double length hash proposal
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Knudsen, L., Muller, F.: Some attacks against a double length hash proposal. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 462-473. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 462-473
-
-
Knudsen, L.1
Muller, F.2
-
8
-
-
51849167537
-
-
Lucks, S.: A collision-resistant rate-1 double-block-length hash function. In: Biham, E., Handschuh, H., Lucks, S., Rijmen, V. (eds.) Symmetric Cryptography, number 07021 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007, Schloss Dagstuhl, Germany. Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI) (2007)
-
Lucks, S.: A collision-resistant rate-1 double-block-length hash function. In: Biham, E., Handschuh, H., Lucks, S., Rijmen, V. (eds.) Symmetric Cryptography, number 07021 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007, Schloss Dagstuhl, Germany. Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI) (2007)
-
-
-
-
9
-
-
38049140585
-
Domain extension of public random functions: Beyond the birthday barrier
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Maurer, U., Tessaro, S.: Domain extension of public random functions: Beyond the birthday barrier. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 187-204. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 187-204
-
-
Maurer, U.1
Tessaro, S.2
-
10
-
-
84937461306
-
One way hash functions and DES
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-466. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 428-466
-
-
Merkle, R.1
-
11
-
-
51849107928
-
Domain extension for random oracles: Beyond the birthday-paradox bound
-
Barcelona, May 24-25
-
Mironov, I., Narayanan, A.: Domain extension for random oracles: Beyond the birthday-paradox bound. In: ECRYPT Hash Workshop 2007, Barcelona, May 24-25 (2007)
-
(2007)
ECRYPT Hash Workshop
-
-
Mironov, I.1
Narayanan, A.2
-
12
-
-
26444539878
-
-
Nandi, M., Lee, W., Sakurai, K., Lee, S.: Security analysis of a 2/3-rate double length compression function in black-box model. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, 3557, pp. 243-254. Springer, Heidelberg (2005)
-
Nandi, M., Lee, W., Sakurai, K., Lee, S.: Security analysis of a 2/3-rate double length compression function in black-box model. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 243-254. Springer, Heidelberg (2005)
-
-
-
-
13
-
-
38149022185
-
Combining compression functions and block cipher-based hash functions
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Peyrin, T., Gilbert, H., Muller, F., Robshaw, M.: Combining compression functions and block cipher-based hash functions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 315-331. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 315-331
-
-
Peyrin, T.1
Gilbert, H.2
Muller, F.3
Robshaw, M.4
-
15
-
-
51849087663
-
Constructing cryptographic hash functions from fixed-key blockciphers
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Rogaway, P., Steinberger, J.: Constructing cryptographic hash functions from fixed-key blockciphers. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 433-450. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 433-450
-
-
Rogaway, P.1
Steinberger, J.2
-
16
-
-
44449089437
-
Security/efficiency tradeoffs for permutation-based hashing
-
Smart, N, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Rogaway, P., Steinberger, J.: Security/efficiency tradeoffs for permutation-based hashing. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 220-236. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 220-236
-
-
Rogaway, P.1
Steinberger, J.2
-
17
-
-
38149078289
-
-
Seurin, Y., Peyrin, T.: Security analysis of constructions combining FIL random oracles. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 119-136. Springer, Heidelberg (2007)
-
Seurin, Y., Peyrin, T.: Security analysis of constructions combining FIL random oracles. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 119-136. Springer, Heidelberg (2007)
-
-
-
-
18
-
-
51849155326
-
Efficient collision-resistant hashing from fixed-length random oracles
-
Barcelona, May 24-25
-
Shrimpton, T., Stam, M.: Efficient collision-resistant hashing from fixed-length random oracles. In: ECRYPT Hash Workshop 2007, Barcelona, May 24-25 (2007)
-
(2007)
ECRYPT Hash Workshop
-
-
Shrimpton, T.1
Stam, M.2
-
19
-
-
49049096334
-
-
Shrimpton, T., Stam, M.: Building a collision-resistant compression function from non-compressing primitives. In: ICALP 2008, Part II, 5126, pp. 643-654. Springer, Heidelberg (2008); Supersedes [18]
-
Shrimpton, T., Stam, M.: Building a collision-resistant compression function from non-compressing primitives. In: ICALP 2008, Part II, vol. 5126, pp. 643-654. Springer, Heidelberg (2008); Supersedes [18]
-
-
-
-
20
-
-
38049103279
-
The collision intractability of MDC-2 in the ideal-cipher model
-
Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
-
Steinberger, J.: The collision intractability of MDC-2 in the ideal-cipher model. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 34-51. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 34-51
-
-
Steinberger, J.1
|