-
1
-
-
70350162850
-
Tiger: A Fast New Hash Function
-
Gollmann, D. (ed.) FSE 1996. Springer, Heidelberg
-
Anderson, R., Biham, E.: Tiger: A Fast New Hash Function. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 89-97. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1039
, pp. 89-97
-
-
Anderson, R.1
Biham, E.2
-
2
-
-
70349881815
-
Preimages for Reduced-Round Tiger
-
Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. Springer, Heidelberg
-
Indesteege, S., Preneel, B.: Preimages for Reduced-Round Tiger. In: Lucks, S., Sadeghi, A.-R., Wolf, C. (eds.) WEWoRC 2007. LNCS, vol. 4945, pp. 90-99. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4945
, pp. 90-99
-
-
Indesteege, S.1
Preneel, B.2
-
3
-
-
70350352267
-
Preimage Attacks on Reduced Tiger and SHA-2
-
Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
-
Isobe, T., Shibutani, K.: Preimage Attacks on Reduced Tiger and SHA-2. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 139-155. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5665
, pp. 139-155
-
-
Isobe, T.1
Shibutani, K.2
-
4
-
-
70350645163
-
Two Passes of Tiger Are Not One-Way
-
Preneel, B. (ed.) AFRICACRYPT 2009. Springer, Heidelberg
-
Mendel, F.: Two Passes of Tiger Are Not One-Way. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 29-40. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5580
, pp. 29-40
-
-
Mendel, F.1
-
5
-
-
33746742309
-
Collisions and Near-Collisions for Reduced-Round Tiger
-
Robshaw, M.J.B. (ed.) FSE 2006. Springer, Heidelberg
-
Kelsey, J., Lucks, S.: Collisions and Near-Collisions for Reduced-Round Tiger. In: Robshaw, M.J.B. (ed.) FSE 2006. LNCS, vol. 4047, pp. 111-125. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4047
, pp. 111-125
-
-
Kelsey, J.1
Lucks, S.2
-
6
-
-
38149053275
-
Update on Tiger
-
Barua, R., Lange, T. (eds.) INDOCRYPT 2006. Springer, Heidelberg
-
Mendel, F., Preneel, B., Rijmen, V., Yoshida, H., Watanabe, D.: Update on Tiger. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 63-79. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4329
, pp. 63-79
-
-
Mendel, F.1
Preneel, B.2
Rijmen, V.3
Yoshida, H.4
Watanabe, D.5
-
7
-
-
38149133737
-
Cryptanalysis of the Tiger Hash Function
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Mendel, F., Rijmen, V.: Cryptanalysis of the Tiger Hash Function. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 536-550. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 536-550
-
-
Mendel, F.1
Rijmen, V.2
-
8
-
-
70350630742
-
Preimage Attacks on One-Block MD4, 63-Step MD5 and More
-
Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
-
Aoki, K., Sasaki, Y.: Preimage Attacks on One-Block MD4, 63-Step MD5 and More. In: Avanzi, R.M., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 103-119. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5381
, pp. 103-119
-
-
Aoki, K.1
Sasaki, Y.2
-
9
-
-
84950929375
-
A Switching Closure Test to Analyze Cryptosystems
-
Feigenbaum, J. (ed.) CRYPTO 1991. Springer, Heidelberg
-
Morita, H., Ohta, K., Miyaguchi, S.: A Switching Closure Test to Analyze Cryptosystems. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 183-193. Springer, Heidelberg (1992)
-
(1992)
LNCS
, vol.576
, pp. 183-193
-
-
Morita, H.1
Ohta, K.2
Miyaguchi, S.3
-
10
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
11
-
-
67650679771
-
Finding Preimages in Full MD5 Faster than Exhaustive Search
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Sasaki, Y., Aoki, K.: Finding Preimages in Full MD5 Faster than Exhaustive Search. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 134-152. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 134-152
-
-
Sasaki, Y.1
Aoki, K.2
-
13
-
-
77954738812
-
-
Guo, J., Ling, S., Rechberger, C., Wang, H.: Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2, http://eprint.iacr.org/2010/016.pdf
-
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
-
-
Guo, J.1
Ling, S.2
Rechberger, C.3
Wang, H.4
|