-
1
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
2
-
-
35048892549
-
Near-Collisions of SHA-0
-
Franklin, M.K, ed, CRYPTO 2004, Springer, Heidelberg
-
Biham, E., Chen, R.: Near-Collisions of SHA-0. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290-305. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 290-305
-
-
Biham, E.1
Chen, R.2
-
3
-
-
24944584156
-
-
Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W.: Collisions of SHA-0 and Reduced SHA-1. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, 3494, pp. 36-57. Springer, Heidelberg (2005)
-
Biham, E., Chen, R., Joux, A., Carribault, P., Lemuet, C., Jalby, W.: Collisions of SHA-0 and Reduced SHA-1. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 36-57. Springer, Heidelberg (2005)
-
-
-
-
4
-
-
77649243367
-
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Contini, S., Yin, Y.L.: Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 37-53. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 37-53
-
-
Contini, S.1
Yin, Y.L.2
-
5
-
-
84985796089
-
-
den Boer, B., Bosselaers, A.: Collisions for the Compression Function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, 765, pp. 293-304. Springer, Heidelberg (1994)
-
den Boer, B., Bosselaers, A.: Collisions for the Compression Function of MD5. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 293-304. Springer, Heidelberg (1994)
-
-
-
-
6
-
-
38149058225
-
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
-
Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
-
Fouque, P.-A., Leurent, G., Nguyen, P.Q.: Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 13-30. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 13-30
-
-
Fouque, P.-A.1
Leurent, G.2
Nguyen, P.Q.3
-
7
-
-
67650674871
-
Secure Management of SNMP Networks
-
Galvin, J.M., McCloghrie, K., Davin, J.R.: Secure Management of SNMP Networks. Integrated Network Management II, 703-714 (1991)
-
(1991)
Integrated Network Management
, vol.2
, pp. 703-714
-
-
Galvin, J.M.1
McCloghrie, K.2
Davin, J.R.3
-
8
-
-
33750029023
-
-
Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0, and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 242-256. Springer, Heidelberg (2006)
-
Kim, J., Biryukov, A., Preneel, B., Hong, S.: On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0, and SHA-1. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 242-256. Springer, Heidelberg (2006)
-
-
-
-
9
-
-
0003629991
-
-
NIST:, Federal Information Processing Standard, FIPS-180-1 April
-
NIST: Secure Hash Standard. Federal Information Processing Standard, FIPS-180-1 (April 1995)
-
(1995)
Secure Hash Standard
-
-
-
10
-
-
51549120471
-
MDx-MAC and Building Fast MACs from Hash Functions
-
Coppersmith, D, ed, CRYPTO 1995, Springer, Heidelberg
-
Preneel, B., van Oorschot, P.: MDx-MAC and Building Fast MACs from Hash Functions. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 1-14. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.963
, pp. 1-14
-
-
Preneel, B.1
van Oorschot, P.2
-
11
-
-
38549124309
-
On Authentication with HMAC and Non-random Properties
-
Dietrich, S, Dhamija, R, eds, FC 2007 and USEC 2007, Springer, Heidelberg
-
Rechberger, C., Rijmen, V.: On Authentication with HMAC and Non-random Properties. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 119-133. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4886
, pp. 119-133
-
-
Rechberger, C.1
Rijmen, V.2
-
12
-
-
44349165814
-
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
-
Rechberger, C., Rijmen, V.: New Results on NMAC/HMAC when Instantiated with Popular Hash Functions. Journal of Universal Computer Science 14(3), 347-376 (2008)
-
(2008)
Journal of Universal Computer Science
, vol.14
, Issue.3
, pp. 347-376
-
-
Rechberger, C.1
Rijmen, V.2
-
13
-
-
0347506735
-
Message Authentication with One-Way Hash Functions
-
Tsudik, G.: Message Authentication with One-Way Hash Functions. ACM Comput. Commun. Rev. 22(5), 29-38 (1992)
-
(1992)
ACM Comput. Commun. Rev
, vol.22
, Issue.5
, pp. 29-38
-
-
Tsudik, G.1
-
14
-
-
44449143916
-
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Wang, L., Ohta, K., Kunihiro, N.: New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 237-253. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 237-253
-
-
Wang, L.1
Ohta, K.2
Kunihiro, N.3
-
15
-
-
24944575304
-
Cryptanalysis of the Hash Functions MD4 and RIPEMD
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1-18. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
16
-
-
33745171465
-
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
-
-
-
-
17
-
-
24944591357
-
How to Break MD5 and Other Hash Functions
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
18
-
-
67650667840
-
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC
-
Joux, A, ed, EUROCRYPT 2009, Springer, Heidelberg
-
Wang, X., Yu, H., Wang, W., Zhang, H., Zhan, T.: Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 121-133. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 121-133
-
-
Wang, X.1
Yu, H.2
Wang, W.3
Zhang, H.4
Zhan, T.5
-
19
-
-
33745122987
-
Efficient Collision Search Attacks on SHA-0
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Wang, X., Yu, H., Yin, Y.L.: Efficient Collision Search Attacks on SHA-0. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 1-16. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 1-16
-
-
Wang, X.1
Yu, H.2
Yin, Y.L.3
-
20
-
-
33744827107
-
-
Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, 3810, pp. 1-12. Springer, Heidelberg (2005)
-
Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y.G., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 1-12. Springer, Heidelberg (2005)
-
-
-
|