-
1
-
-
50249123123
-
The hash function family LAKE
-
In: Nyberg, K. (ed.) Springer, Heidelberg
-
Aumasson, J.-P., Meier, W., Phan, R.C.-W.: The hash function family LAKE. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 36-53. Springer, Heidelberg (2008)
-
(2008)
FSE 2008. LNCS
, vol.5086
, pp. 36-53
-
-
Aumasson, J.-P.1
Meier, W.2
Phan, R.C.-W.3
-
2
-
-
67650179235
-
LASH, Tech. report
-
Bentahar, K., Page, D., Saarinen, M.-J.O., Silverman, J.H., Smart, N.: LASH, Tech. report, NIST Cryptographic Hash Workshop (2006)
-
(2006)
NIST Cryptographic Hash Workshop
-
-
Bentahar, K.1
Page, D.2
Saarinen, M.-J.O.3
Silverman, J.H.4
Smart, N.5
-
3
-
-
67650169918
-
-
Bertoni, G., Daemen, J., Peeters, M., van Assche, G.: Radiogatun, a belt-and-mill hash function (2006), http://radiogatun.noekeon.org/
-
(2006)
Radiogatun, a belt-and-mill hash function
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
4
-
-
38049183978
-
Finding SHA-1 characteristics: General results and applications
-
In: Lai, X., Chen, K. (eds.) Springer, Heidelberg
-
De Cannière, C., Rechberger, C.: Finding SHA-1 characteristics: General results and applications. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 1-20. Springer, Heidelberg (2006)
-
(2006)
ASIACRYPT 2006. LNCS
, vol.4284
, pp. 1-20
-
-
De Cannière, C.1
Rechberger, C.2
-
6
-
-
50249187719
-
Cryptanalysis of LASH
-
In: Nyberg, K. (ed.) Springer, Heidelberg
-
Contini, S., Matusiewicz, K., Pieprzyk, J., Steinfeld, R., Jian, G., San, L., Wang, H.: Cryptanalysis of LASH. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 207-223. Springer, Heidelberg (2008)
-
(2008)
FSE 2008. LNCS
, vol.5086
, pp. 207-223
-
-
Contini, S.1
Matusiewicz, K.2
Pieprzyk, J.3
Steinfeld, R.4
Jian, G.5
San, L.6
Wang, H.7
-
8
-
-
84946823597
-
The wide trail design strategy
-
Daemen, J., Rijmen, V.: The wide trail design strategy. In: IMA Int. Conf., pp. 222-238 (2001)
-
(2001)
IMA Int. Conf.
, pp. 222-238
-
-
Daemen, J.1
Rijmen, V.2
-
12
-
-
38149002857
-
The grindahl hash functions
-
In: Biryukov, A. (ed.) Springer, Heidelberg
-
Knudsen, L.R., Rechberger, C., Thomsen, S.S.: The grindahl hash functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 39-57. Springer, Heidelberg (2007)
-
(2007)
FSE 2007. LNCS
, vol.4593
, pp. 39-57
-
-
Knudsen, L.R.1
Rechberger, C.2
Thomsen, S.S.3
-
13
-
-
50249110629
-
Collisions on SHA-0 in one hour
-
In: Nyberg, K. (ed.) Springer, Heidelberg
-
Manuel, S., Peyrin, T.: Collisions on SHA-0 in one hour. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 16-35. Springer, Heidelberg (2008)
-
(2008)
FSE 2008. LNCS
, vol.5086
, pp. 16-35
-
-
Manuel, S.1
Peyrin, T.2
-
14
-
-
38149037030
-
Cryptanalysis of FORK-256
-
In: Biryukov, A. (ed.) Springer, Heidelberg
-
Matusiewicz, K., Peyrin, T., Billet, O., Contini, S., Pieprzyk, J.: Cryptanalysis of FORK-256. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 19-38. Springer, Heidelberg (2007)
-
(2007)
FSE 2007. LNCS
, vol.4593
, pp. 19-38
-
-
Matusiewicz, K.1
Peyrin, T.2
Billet, O.3
Contini, S.4
Pieprzyk, J.5
-
15
-
-
38149068987
-
Cryptanalysis of Grindahl
-
In: Kurosawa, K. (ed.) Springer, Heidelberg
-
Peyrin, T.: Cryptanalysis of Grindahl. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 551-567. Springer, Heidelberg (2007)
-
(2007)
ASIACRYPT 2007. LNCS
, vol.4833
, pp. 551-567
-
-
Peyrin, T.1
-
16
-
-
85026897539
-
Hash functions based on block ciphers: A synthetic approach
-
In: Stinson, D.R. (ed.) Springer, Heidelberg
-
Preneel, B., Govaerts, R., Vandewalle, J.: Hash functions based on block ciphers: A synthetic approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 368-378. Springer, Heidelberg (1994)
-
(1994)
CRYPTO 1993. LNCS
, vol.773
, pp. 368-378
-
-
Preneel, B.1
Govaerts, R.2
Vandewalle, J.3
-
18
-
-
33745171465
-
Finding collisions in the full SHA-1
-
3621 LNCSAdvances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005) (Pubitemid 43902104)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
19
-
-
24944591357
-
How to break MD5 and other hash functions
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005) (Pubitemid 41313944)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
|