-
2
-
-
77649268663
-
Multi-property-preserving hash domain extension and the EMD transform
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Bellare, M., Ristenpart, T.: Multi-property-preserving hash domain extension and the EMD transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 299-314. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 299-314
-
-
Bellare, M.1
Ristenpart, T.2
-
4
-
-
51849150617
-
-
May 2007
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge functions (May 2007), http://www.csrc.nist.gov/pki/HashWorkshop/PublicComments/2007Hay. html
-
Sponge functions
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
5
-
-
44449147491
-
On the indifferentiabil-ity of the sponge construction
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the indifferentiabil-ity of the sponge construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 181-197. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 181-197
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
6
-
-
84904438721
-
Sufficient conditions for sound tree hashing modes
-
Handschuh, H, Lucks, S, Preneel, B, Rogaway, P, eds
-
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sufficient conditions for sound tree hashing modes. In: Handschuh, H., Lucks, S., Preneel, B., Rogaway, P. (eds.) Symmetric Cryptography. Dagstuhl Seminar Proceedings (2009), http://www.dagstuhl.de/Haterials/index.en.phtml?09031
-
(2009)
Symmetric Cryptography. Dagstuhl Seminar Proceedings
-
-
Bertoni, G.1
Daemen, J.2
Peeters, M.3
Van Assche, G.4
-
7
-
-
84957643546
-
Differential collisions of SHA-0
-
Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
-
Chabaud, F., Joux, A.: Differential collisions of SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56-71. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1462
, pp. 56-71
-
-
Chabaud, F.1
Joux, A.2
-
8
-
-
77649256571
-
Indifferentiable security analysis of popular hash functions with prefix-free padding
-
Lai, X, Chen, K, eds, ASI-ACRYPT 2006, Springer, Heidelberg
-
Chang, D., Lee, S., Nandi, M., Yung, M.: Indifferentiable security analysis of popular hash functions with prefix-free padding. In: Lai, X., Chen, K. (eds.) ASI-ACRYPT 2006. LNCS, vol. 4284, pp. 283-298. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 283-298
-
-
Chang, D.1
Lee, S.2
Nandi, M.3
Yung, M.4
-
9
-
-
33745119040
-
Merkle-Damgård revisited: How to construct a hash function
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgård revisited: How to construct a hash function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430-448. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 430-448
-
-
Coron, J.-S.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
11
-
-
70350752375
-
-
Dinur, I., Shamir, A.: Cube attack on a reduced version of the compression function with 15 rounds
-
Dinur, I., Shamir, A.: Cube attack on a reduced version of the compression function with 15 rounds
-
-
-
-
12
-
-
44449166046
-
A new mode of operation for block ciphers and length-preserving MACs
-
Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
-
Dodis, Y., Pietrzak, K., Puniya, P.: A new mode of operation for block ciphers and length-preserving MACs. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 198-219. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4965
, pp. 198-219
-
-
Dodis, Y.1
Pietrzak, K.2
Puniya, P.3
-
13
-
-
35048817517
-
-
Maurer, U., Renner, R., Holenstein, C.: Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 21-39. Springer, Heidelberg (2004)
-
Maurer, U., Renner, R., Holenstein, C.: Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 21-39. Springer, Heidelberg (2004)
-
-
-
-
14
-
-
62349117678
-
Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family
-
November 2
-
National Institute of Standards and Technology. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family. Federal Register Notices, vol. 72(212), pp. 62212-62220 (November 2, 2007), http://csrc.nist.gov/groups/ST/hash/documents/FR-Notice-Nov07.pdf
-
(2007)
Federal Register Notices
, vol.72
, Issue.212
, pp. 62212-62220
-
-
-
15
-
-
84869649948
-
Announcing the development of new hash algorithm(s) for the revision of Federal Information Processing Standard (FIPS) 1802, secure hash standard
-
January 23
-
National Institute of Standards and Technology. Announcing the development of new hash algorithm(s) for the revision of Federal Information Processing Standard (FIPS) 1802, secure hash standard. Federal Register Notices, vol. 72(14), pp. 2861-2863 (January 23, 2007), http://csrc.nist.gov/groups/ST/ hash/documents/FR-Notice-Jan07.pdf
-
(2007)
Federal Register Notices
, vol.72
, Issue.14
, pp. 2861-2863
-
-
-
17
-
-
70350403187
-
-
Rivest, R.L., Agre, B., Bailey, D.V., Crutchfield, C., Dodis, Y., Fleming, K.E., Khan, A., Krishnamurthy, J., Lin, Y., Reyzin, L., Shen, E., Sukha, J., Sutherland, D., Tromer, E., Yin, Y.L.: The MD6 hash function: A proposal to NIST for SHA-3 (2008), http://groups.csail.mit.edu/cis/md6/ submitted-2008-10-27/Supporting-Documentation/md6-report.pdf
-
(2008)
The MD6 hash function: A proposal to NIST for SHA-3
-
-
Rivest, R.L.1
Agre, B.2
Bailey, D.V.3
Crutchfield, C.4
Dodis, Y.5
Fleming, K.E.6
Khan, A.7
Krishnamurthy, J.8
Lin, Y.9
Reyzin, L.10
Shen, E.11
Sukha, J.12
Sutherland, D.13
Tromer, E.14
Yin, Y.L.15
-
18
-
-
24944575304
-
Cryptanalysis of the hash functions MD4 and RIPEMD
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1-18. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
19
-
-
33745171465
-
-
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
-
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
-
-
-
-
20
-
-
24944591357
-
How to Break MD5 and Other Hash Functions
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
21
-
-
33745122987
-
Efficient Collision Search Attacks on SHA-0
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Wang, X., Yu, H., Yin, Y.L.: Efficient Collision Search Attacks on SHA-0. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 1-16. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 1-16
-
-
Wang, X.1
Yu, H.2
Yin, Y.L.3
-
22
-
-
54249126405
-
Multicollision attack on the compression functions of MD4 and 3-pass HAVAL. IACR ePrint Archive
-
Report 2007/085
-
Yu, H., Wang, X.: Multicollision attack on the compression functions of MD4 and 3-pass HAVAL. IACR ePrint Archive, Report 2007/085 (2007), http://eprint.iacr.org/2007/085
-
(2007)
-
-
Yu, H.1
Wang, X.2
|