-
1
-
-
38149094108
-
Seven-property- preserving iterated hashing: Rox
-
Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
-
Andreeva, E., Neven, G., Preneel, B., Shrimpton, T.: Seven-property- preserving iterated hashing: Rox. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 130-146. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 130-146
-
-
Andreeva, E.1
Neven, G.2
Preneel, B.3
Shrimpton, T.4
-
2
-
-
70350774147
-
-
Bernstein, D.J.: Cubehash specification (2.b.l). Submission to NIST (2008)
-
Bernstein, D.J.: Cubehash specification (2.b.l). Submission to NIST (2008)
-
-
-
-
3
-
-
51849150617
-
Sponge functions
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge functions. In: Ecrypt Hash Workshop (2007)
-
(2007)
Ecrypt Hash Workshop
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
4
-
-
44449147491
-
On the indifferentiabil-ity of the sponge construction
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the indifferentiabil-ity of the sponge construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 181-197. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 181-197
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
5
-
-
50449107349
-
Black-box analysis of the block-cipher-based hash-function constructions from PGV
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Black, J., Rogaway, P., Shrimpton, T.: Black-box analysis of the block-cipher-based hash-function constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320-335. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 320-335
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
6
-
-
84981199109
-
A design principle for hash functions
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Damgård, I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 416-427
-
-
Damgård, I.1
-
7
-
-
70350761772
-
-
Duo, L., Li, C.: Improved collision and preimage resistance bounds on PGV schemes. IACR ePrint Archive, Report 2006/462 (2006), http://eprint.iacr.org/ 2006/462
-
Duo, L., Li, C.: Improved collision and preimage resistance bounds on PGV schemes. IACR ePrint Archive, Report 2006/462 (2006), http://eprint.iacr.org/ 2006/462
-
-
-
-
8
-
-
84957799016
-
Security of iterated hash functions based on block ciphers
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Hohl, W., Lai, X., Meier, T., Waldvogel, C.: Security of iterated hash functions based on block ciphers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 379-390. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.773
, pp. 379-390
-
-
Hohl, W.1
Lai, X.2
Meier, T.3
Waldvogel, C.4
-
9
-
-
38149002857
-
-
Knudsen, L.R., Rechberger, C., Thomsen, S.S.: The Grindahl hash functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 39-57. Springer, Heidelberg (2007)
-
Knudsen, L.R., Rechberger, C., Thomsen, S.S.: The Grindahl hash functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 39-57. Springer, Heidelberg (2007)
-
-
-
-
11
-
-
0022029028
-
Generating strong one-way functions with cryptographic algorithms
-
Matyas, S., Meyer, C., Oseas, J.: Generating strong one-way functions with cryptographic algorithms. IBM Technical Disclosure Bulletin 27(10a), 5658-5659 (1985)
-
(1985)
IBM Technical Disclosure Bulletin
, vol.27
, Issue.10 A
, pp. 5658-5659
-
-
Matyas, S.1
Meyer, C.2
Oseas, J.3
-
12
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A., van Oorschot, P., Vanstone, S.: CRC-Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
-
(1996)
CRC-Handbook of Applied Cryptography
-
-
Menezes, A.1
van Oorschot, P.2
Vanstone, S.3
-
13
-
-
84937461306
-
One way hash functions and DES
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 428-446
-
-
Merkle, R.C.1
-
14
-
-
45449088226
-
New 128-bit hash function
-
Miyaguchi, S., Iwata, M., Ohta, K.: New 128-bit hash function. In: Proceedings 4th International Joint Workshop on Computer Communications, pp. 279-288 (1989)
-
(1989)
Proceedings 4th International Joint Workshop on Computer Communications
, pp. 279-288
-
-
Miyaguchi, S.1
Iwata, M.2
Ohta, K.3
-
15
-
-
85026897539
-
Hash functions based on block ciphers: A synthetic approach
-
Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
-
Preneel, B., Govaerts, R., Vandewalle, J.: Hash functions based on block ciphers: A synthetic approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 368-378. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.773
, pp. 368-378
-
-
Preneel, B.1
Govaerts, R.2
Vandewalle, J.3
-
16
-
-
35048855067
-
-
Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 371-388. Springer, Heidelberg (2004)
-
Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371-388. Springer, Heidelberg (2004)
-
-
-
-
17
-
-
44449089437
-
Security/efficiency tradeoffs for permutation-based hashing
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Rogaway, P., Steinberger, J.: Security/efficiency tradeoffs for permutation-based hashing. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 220-236. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 220-236
-
-
Rogaway, P.1
Steinberger, J.2
-
18
-
-
51849094862
-
Beyond uniformity: Better security/efficiency tradeoffs for compression functions
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Stam, M.: Beyond uniformity: Better security/efficiency tradeoffs for compression functions. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 397-412. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 397-412
-
-
Stam, M.1
-
19
-
-
70350780267
-
Blockcipher based hashing revisited. IACR ePrint Archive
-
Report 2008/071
-
Stam, M.: Blockcipher based hashing revisited. IACR ePrint Archive, Report 2008/071 (2008), http://eprint.iacr.org/2008/071
-
(2008)
-
-
Stam, M.1
|