메뉴 건너뛰기




Volumn 5473, Issue , 2009, Pages 164-181

Speeding up collision search for byte-oriented hash functions

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA METHOD; COMPRESSION FUNCTIONS; LOWER BOUNDS; NEW TOOLS; RIJNDAEL; S-BOXES; SECOND PREIMAGE ATTACK; SLOW DIFFUSION;

EID: 67650155452     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00862-7_11     Document Type: Conference Paper
Times cited : (20)

References (19)
  • 1
    • 50249123123 scopus 로고    scopus 로고
    • The hash function family LAKE
    • In: Nyberg, K. (ed.) Springer, Heidelberg
    • Aumasson, J.-P., Meier, W., Phan, R.C.-W.: The hash function family LAKE. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 36-53. Springer, Heidelberg (2008)
    • (2008) FSE 2008. LNCS , vol.5086 , pp. 36-53
    • Aumasson, J.-P.1    Meier, W.2    Phan, R.C.-W.3
  • 4
    • 38049183978 scopus 로고    scopus 로고
    • Finding SHA-1 characteristics: General results and applications
    • In: Lai, X., Chen, K. (eds.) Springer, Heidelberg
    • De Cannière, C., Rechberger, C.: Finding SHA-1 characteristics: General results and applications. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 1-20. Springer, Heidelberg (2006)
    • (2006) ASIACRYPT 2006. LNCS , vol.4284 , pp. 1-20
    • De Cannière, C.1    Rechberger, C.2
  • 8
    • 84946823597 scopus 로고    scopus 로고
    • The wide trail design strategy
    • Daemen, J., Rijmen, V.: The wide trail design strategy. In: IMA Int. Conf., pp. 222-238 (2001)
    • (2001) IMA Int. Conf. , pp. 222-238
    • Daemen, J.1    Rijmen, V.2
  • 12
    • 38149002857 scopus 로고    scopus 로고
    • The grindahl hash functions
    • In: Biryukov, A. (ed.) Springer, Heidelberg
    • Knudsen, L.R., Rechberger, C., Thomsen, S.S.: The grindahl hash functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 39-57. Springer, Heidelberg (2007)
    • (2007) FSE 2007. LNCS , vol.4593 , pp. 39-57
    • Knudsen, L.R.1    Rechberger, C.2    Thomsen, S.S.3
  • 13
    • 50249110629 scopus 로고    scopus 로고
    • Collisions on SHA-0 in one hour
    • In: Nyberg, K. (ed.) Springer, Heidelberg
    • Manuel, S., Peyrin, T.: Collisions on SHA-0 in one hour. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 16-35. Springer, Heidelberg (2008)
    • (2008) FSE 2008. LNCS , vol.5086 , pp. 16-35
    • Manuel, S.1    Peyrin, T.2
  • 14
    • 38149037030 scopus 로고    scopus 로고
    • Cryptanalysis of FORK-256
    • In: Biryukov, A. (ed.) Springer, Heidelberg
    • Matusiewicz, K., Peyrin, T., Billet, O., Contini, S., Pieprzyk, J.: Cryptanalysis of FORK-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 19-38. Springer, Heidelberg (2007)
    • (2007) FSE 2007. LNCS , vol.4593 , pp. 19-38
    • Matusiewicz, K.1    Peyrin, T.2    Billet, O.3    Contini, S.4    Pieprzyk, J.5
  • 15
    • 38149068987 scopus 로고    scopus 로고
    • Cryptanalysis of Grindahl
    • In: Kurosawa, K. (ed.) Springer, Heidelberg
    • Peyrin, T.: Cryptanalysis of Grindahl. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 551-567. Springer, Heidelberg (2007)
    • (2007) ASIACRYPT 2007. LNCS , vol.4833 , pp. 551-567
    • Peyrin, T.1
  • 16
    • 85026897539 scopus 로고
    • Hash functions based on block ciphers: A synthetic approach
    • In: Stinson, D.R. (ed.) Springer, Heidelberg
    • Preneel, B., Govaerts, R., Vandewalle, J.: Hash functions based on block ciphers: A synthetic approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 368-378. Springer, Heidelberg (1994)
    • (1994) CRYPTO 1993. LNCS , vol.773 , pp. 368-378
    • Preneel, B.1    Govaerts, R.2    Vandewalle, J.3
  • 19
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005) (Pubitemid 41313944)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.