-
1
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
Advances in Cryptology - CRYPTO '96
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.1109, pp. 1-15. Springer, Heidelberg (1996) (Pubitemid 126106226)
-
(1996)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
3
-
-
35048892549
-
Near-collisions of SHA-0
-
In: Franklin, M. (ed.), LNCS Springer, Heidelberg
-
Biham, E., Chen, R.: Near-collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.3152, pp. 290-305. Springer, Heidelberg (2004)
-
(2004)
CRYPTO 2004
, vol.3152
, pp. 290-305
-
-
Biham, E.1
Chen, R.2
-
4
-
-
24944584156
-
Collisions of SHA-0 and reduced SHA-1
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W.: Collisions of SHA-0 and reduced SHA-1. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 36-57. Springer, Heidelberg (2005) (Pubitemid 41313945)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 36-57
-
-
Biham, E.1
Chen, R.2
Joux, A.3
Carribault, P.4
Lemuet, C.5
Jalby, W.6
-
5
-
-
84985796089
-
Collisions for the compression function of MD5
-
In: Helleseth, T. (ed.) LNCS Springer, Heidelberg
-
Den Boer, B., Bosselaers, A.: Collisions for the compression function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol.765, pp. 293-304. Springer, Heidelberg (1994)
-
(1994)
EUROCRYPT 1993
, vol.765
, pp. 293-304
-
-
Den Boer, B.1
Bosselaers, A.2
-
6
-
-
77649243367
-
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
-
In: Lai, X., Chen, K. (eds.) LNCS Springer, Heidelberg
-
Contini, S., Yin, Y.L.: Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.4284, pp. 37-53. Springer, Heidelberg (2006)
-
(2006)
ASIACRYPT 2006
, vol.4284
, pp. 37-53
-
-
Contini, S.1
Yin, Y.L.2
-
7
-
-
38149058225
-
Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
-
In: Menezes, A. (ed.) LNCS Springer, Heidelberg
-
Fouque, P.-A., Leurent, G., Nguyen, P.Q.: Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.4622, pp. 13-30. Springer, Heidelberg (2007)
-
(2007)
CRYPTO 2007
, vol.4622
, pp. 13-30
-
-
Fouque, P.-A.1
Leurent, G.2
Nguyen, P.Q.3
-
8
-
-
67650674871
-
Secure management of SNMP networks
-
Galvin, J.M., McCloghrie, K., Davin, J.R.: Secure management of SNMP networks. Integrated Network Management II, 703-714 (1991)
-
(1991)
Integrated Network Management II
, pp. 703-714
-
-
Galvin, J.M.1
McCloghrie, K.2
Davin, J.R.3
-
9
-
-
33750029023
-
On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1
-
Security and Cryptography for Networks - 5th International Conference, SCN 2006, Proceedings
-
Kim, J.-S., Biryukov, A., Preneel, B., Hong, S.H.: On the security of HMAC and NMAC based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended abstract). In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol.4116, pp. 242-256. Springer, Heidelberg (2006) (Pubitemid 44568303)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4116
, pp. 242-256
-
-
Kim, J.1
Biryukov, A.2
Preneel, B.3
Hong, S.4
-
10
-
-
51549120471
-
MDx-MAC and building fast MACs from hash functions
-
In: Coppersmith, D. (ed.) LNCS, Springer, Heidelberg
-
Preneel, B., Van Oorschot, P.: MDx-MAC and building fast MACs from hash functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.963, pp. 1-14. Springer, Heidelberg (1995)
-
(1995)
CRYPTO 1995
, vol.963
, pp. 1-14
-
-
Preneel, B.1
Van Oorschot, P.2
-
11
-
-
38549124309
-
On authentication with HMAC and non-random properties
-
Financial Cryptography and Data Security - 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Revised Selected Papers
-
Rechberger, C., Rijmen, V.: On authentication with HMAC and non-random properties. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol.4886, pp. 119-133. Springer, Heidelberg (2007) (Pubitemid 351153048)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4886
, pp. 119-133
-
-
Rechberger, C.1
Rijmen, V.2
-
12
-
-
44349165814
-
New results on NMAC/HMAC when instantiated with popular hash functions
-
Rechberger, C., Rijmen, V.: New results on NMAC/HMAC when instantiated with popular hash functions. Journal of Universal Computer Science 14(3), 347-376 (2008)
-
(2008)
Journal of Universal Computer Science
, vol.14
, Issue.3
, pp. 347-376
-
-
Rechberger, C.1
Rijmen, V.2
-
13
-
-
0003195066
-
The MD5 message digest algorithm
-
Network Working Group
-
Rivest, R.L.: The MD5 message digest algorithm. Request for Comments (RFC 1321), Network Working Group (1992)
-
(1992)
Request for Comments (RFC 1321)
-
-
Rivest, R.L.1
-
14
-
-
0347506735
-
Message authentication with one-way hash functions
-
Tsudik, G.: Message authentication with one-way hash functions. ACM Comput. Commun. Rev. 22(5), 29-38 (1992)
-
(1992)
ACM Comput. Commun. Rev.
, vol.22
, Issue.5
, pp. 29-38
-
-
Tsudik, G.1
-
15
-
-
44449143916
-
New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
-
DOI 10.1007/978-3-540-78967-3-14, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Wang, L., Ohta, K., Kunihiro, N.: New key-recovery attacks on HMAC/NMACMD4 and NMAC-MD5. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol.4965, pp. 237-253. Springer, Heidelberg (2008) (Pubitemid 351762833)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965
, pp. 237-253
-
-
Wang, L.1
Ohta, K.2
Kunihiro, N.3
-
16
-
-
24944575304
-
Cryptanalysis of the hash functions MD4 and RIPEMD
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 1-18. Springer, Heidelberg (2005) (Pubitemid 41313943)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
17
-
-
24944591357
-
How to break MD5 and other hash functions
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.3494, pp. 19-35. Springer, Heidelberg (2005) (Pubitemid 41313944)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
18
-
-
33646748234
-
Efficient collision search attacks on SHA-0
-
In: Shoup, V. (ed.), LNCS, Springer, Heidelberg
-
Wang, X., Yu, H., Yin, Y.L.: Efficient collision search attacks on SHA-0. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.3621, pp. 1-16. Springer, Heidelberg (2005)
-
(2005)
CRYPTO 2005
, vol.3621
, pp. 1-16
-
-
Wang, X.1
Yu, H.2
Yin, Y.L.3
-
19
-
-
33745171465
-
Finding collisions in the full SHA-1
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol.3621, pp. 17-36. Springer, Heidelberg (2005) (Pubitemid 43902104)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
20
-
-
74549196057
-
How to swindle rabin
-
Yuval, G.: How to swindle rabin. Cryptologia 3, 187-190 (1979)
-
(1979)
Cryptologia 3
, pp. 187-190
-
-
Yuval, G.1
|