-
2
-
-
78650828230
-
-
Rsync, http://rsync.samba.org/
-
Rsync
-
-
-
4
-
-
78650822827
-
-
3-Sum Problem, http://en.wikipedia.org/wiki/3SUM
-
3-Sum Problem
-
-
-
5
-
-
70350162850
-
TIGER: A Fast New Hash Function
-
Gollmann, D. (ed.) FSE 1996. Springer, Heidelberg
-
Anderson, R.J., Biham, E.: TIGER: A Fast New Hash Function. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 89-97. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1039
, pp. 89-97
-
-
Anderson, R.J.1
Biham, E.2
-
6
-
-
72449208565
-
Preimages for Step- Reduced SHA-2
-
Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
-
Aoki, K., Guo, J., Matusiewicz, K., Sasaki, Y., Wang, L.: Preimages for Step- Reduced SHA-2. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 578-597. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5912
, pp. 578-597
-
-
Aoki, K.1
Guo, J.2
Matusiewicz, K.3
Sasaki, Y.4
Wang, L.5
-
7
-
-
70350302881
-
Meet-in-the-Middle Preimage Attacks Against Reduced SHA- 0 and SHA-1
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Aoki, K., Sasaki, Y.: Meet-in-the-Middle Preimage Attacks Against Reduced SHA- 0 and SHA-1. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 70-89. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 70-89
-
-
Aoki, K.1
Sasaki, Y.2
-
8
-
-
70350630742
-
Preimage Attacks on One-Block MD4, 63-Step MD5 and More
-
Avanzi, R., Keliher, L., Sica, F. (eds.) SAC 2008. Springer, Heidelberg
-
Aoki, K., Sasaki, Y.: Preimage Attacks on One-Block MD4, 63-Step MD5 and More. In: Avanzi, R., Keliher, L., Sica, F. (eds.) SAC 2008. LNCS, vol. 5381, pp. 103-119. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5381
, pp. 103-119
-
-
Aoki, K.1
Sasaki, Y.2
-
9
-
-
40649095740
-
Subquadratic algorithms for 3SUM
-
Baran, I., Demaine, E.D., Patrascu, M.: Subquadratic algorithms for 3SUM. Algorithmica 50(4), 584-596 (2008)
-
(2008)
Algorithmica
, vol.50
, Issue.4
, pp. 584-596
-
-
Baran, I.1
Demaine, E.D.2
Patrascu, M.3
-
10
-
-
33749576843
-
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs
-
Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
-
Barkan, E., Biham, E., Shamir, A.: Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 1-21. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 1-21
-
-
Barkan, E.1
Biham, E.2
Shamir, A.3
-
11
-
-
50249095647
-
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Biham, E.: New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 444-461. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 444-461
-
-
Biham, E.1
-
12
-
-
38049183978
-
Finding SHA-1 Characteristics: General Results and Applications
-
Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
-
De Cannière, C., Rechberger, C.: Finding SHA-1 Characteristics: General Results and Applications. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 1-20. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 1-20
-
-
De Cannière, C.1
Rechberger, C.2
-
13
-
-
51849105110
-
Preimages for Reduced SHA-0 and SHA-1
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
De Cannière, C., Rechberger, C.: Preimages for Reduced SHA-0 and SHA-1. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 179-202. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 179-202
-
-
De Cannière, C.1
Rechberger, C.2
-
14
-
-
84947903609
-
The First Two Rounds of MD4 are Not One-Way
-
Vaudenay, S. (ed.) FSE 1998. Springer, Heidelberg
-
Dobbertin, H.: The First Two Rounds of MD4 are Not One-Way. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 284-292. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1372
, pp. 284-292
-
-
Dobbertin, H.1
-
16
-
-
78649830280
-
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2
-
ePrint Archive, Report 2010/016
-
Guo, J., Ling, S., Rechberger, C., Wang, H.: Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Cryptology ePrint Archive, Report 2010/016 (2010), http://eprint.iacr. org/2010/016.pdf
-
(2010)
Cryptology
-
-
Guo, J.1
Ling, S.2
Rechberger, C.3
Wang, H.4
-
19
-
-
70350352267
-
Preimage Attacks on Reduced Tiger and SHA-2
-
Dunkelman, O. (ed.) Fast Software Encryption. Springer, Heidelberg
-
Isobe, T., Shibutani, K.: Preimage Attacks on Reduced Tiger and SHA-2. In: Dunkelman, O. (ed.) Fast Software Encryption. LNCS, vol. 5665, pp. 139-155. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5665
, pp. 139-155
-
-
Isobe, T.1
Shibutani, K.2
-
20
-
-
24944541563
-
n work
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
n work. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 474-490. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 474-490
-
-
Kelsey, J.1
Schneier, B.2
-
21
-
-
70350364574
-
Meet-in-the-Middle Attacks on SHA-3 Candidates
-
Dunkelman, O. (ed.) Fast Software Encryption. Springer, Heidelberg
-
Khovratovich, D., Nikolic, I., Weinmann, R.-P.: Meet-in-the-Middle Attacks on SHA-3 Candidates. In: Dunkelman, O. (ed.) Fast Software Encryption. LNCS, vol. 5665, pp. 228-245. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5665
, pp. 228-245
-
-
Khovratovich, D.1
Nikolic, I.2
Weinmann, R.-P.3
-
22
-
-
74349131341
-
Cryptanalysis of MD2
-
Knudsen, L.R., Mathiassen, J.E., Muller, F., Thomsen, S.S.: Cryptanalysis of MD2. Journal of Cryptology 23(1), 72-90 (2010)
-
(2010)
Journal of Cryptology
, vol.23
, Issue.1
, pp. 72-90
-
-
Knudsen, L.R.1
Mathiassen, J.E.2
Muller, F.3
Thomsen, S.S.4
-
23
-
-
84985820553
-
Hash Function Based on Block Ciphers
-
Rueppel, R.A. (ed.) EUROCRYPT 1992. Springer, Heidelberg
-
Lai, X., Massey, J.L.: Hash Function Based on Block Ciphers. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 55-70. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.658
, pp. 55-70
-
-
Lai, X.1
Massey, J.L.2
-
24
-
-
78650839108
-
Second Preimages for SMASH
-
Abe, M. (ed.) CT-RSA 2007. Springer, Heidelberg
-
Lamberger, M., Pramstaller, N., Rechberger, C., Rijmen, V.: Second Preimages for SMASH. In: Abe, M. (ed.) CT-RSA 2007. LNCS, vol. 4377, pp. 101-111. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4377
, pp. 101-111
-
-
Lamberger, M.1
Pramstaller, N.2
Rechberger, C.3
Rijmen, V.4
-
25
-
-
48849093183
-
Analysis of the Hash Function Design Strategy Called SMASH
-
Lamberger, M., Pramstaller, N., Rechberger, C., Rijmen, V.: Analysis of the Hash Function Design Strategy Called SMASH. IEEE Transactions on Information Theory 54(8), 3647-3655 (2008)
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.8
, pp. 3647-3655
-
-
Lamberger, M.1
Pramstaller, N.2
Rechberger, C.3
Rijmen, V.4
-
26
-
-
38149073454
-
Message Freedom in MD4 and MD5 Collisions: Application to APOP
-
Biryukov, A. (ed.) FSE 2007. Springer, Heidelberg
-
Leurent, G.: Message Freedom in MD4 and MD5 Collisions: Application to APOP. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 309-328. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4593
, pp. 309-328
-
-
Leurent, G.1
-
27
-
-
50249175901
-
MD4 is Not One-Way
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Leurent, G.: MD4 is Not One-Way. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 412-428. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 412-428
-
-
Leurent, G.1
-
28
-
-
50249150778
-
A (Second) Preimage Attack on the GOST Hash Function
-
Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
-
Mendel, F., Pramstaller, N., Rechberger, C.: A (Second) Preimage Attack on the GOST Hash Function. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 224-234. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5086
, pp. 224-234
-
-
Mendel, F.1
Pramstaller, N.2
Rechberger, C.3
-
29
-
-
51849136016
-
Cryptanalysis of the GOST Hash Function
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Mendel, F., Pramstaller, N., Rechberger, C., Kontak, M., Szmidt, J.: Cryptanalysis of the GOST Hash Function. In:Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 162-178. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 162-178
-
-
Mendel, F.1
Pramstaller, N.2
Rechberger, C.3
Kontak, M.4
Szmidt, J.5
-
30
-
-
38149053275
-
Update on Tiger
-
Barua, R., Lange, T. (eds.) INDOCRYPT 2006. Springer, Heidelberg
-
Mendel, F., Preneel, B., Rijmen, V., Yoshida, H., Watanabe, D.: Update on Tiger. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 63-79. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4329
, pp. 63-79
-
-
Mendel, F.1
Preneel, B.2
Rijmen, V.3
Yoshida, H.4
Watanabe, D.5
-
31
-
-
38149133737
-
Cryptanalysis of the Tiger Hash Function
-
Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
-
Mendel, F., Rijmen, V.: Cryptanalysis of the Tiger Hash Function. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 536-550. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4833
, pp. 536-550
-
-
Mendel, F.1
Rijmen, V.2
-
32
-
-
38149012340
-
Weaknesses in the HAS-V Compression Function
-
Nam, K.-H., Rhee, G. (eds.) ICISC 2007. Springer, Heidelberg
-
Mendel, F., Rijmen, V.:Weaknesses in the HAS-V Compression Function. In: Nam, K.-H., Rhee, G. (eds.) ICISC 2007. LNCS, vol. 4817, pp. 335-345. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4817
, pp. 335-345
-
-
Mendel, F.1
Rijmen, V.2
-
33
-
-
84944878354
-
-
CRC Press, Boca Raton
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
34
-
-
26444553252
-
The MD2 Hash Function Is Not One-Way
-
Lee, P.J. (ed.) ASIACRYPT 2004. Springer, Heidelberg
-
Muller, F.: The MD2 Hash Function Is Not One-Way. In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 214-229. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3329
, pp. 214-229
-
-
Muller, F.1
-
35
-
-
33745822369
-
Improved Collision Attack on MD4 with Probability Almost 1
-
Won, D.H., Kim, S. (eds.) ICISC 2005. Springer, Heidelberg
-
Naito, Y., Sasaki, Y., Kunihiro, N., Ohta, K.: Improved Collision Attack on MD4 with Probability Almost 1. In: Won, D.H., Kim, S. (eds.) ICISC 2005. LNCS, vol. 3935, pp. 129-145. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3935
, pp. 129-145
-
-
Naito, Y.1
Sasaki, Y.2
Kunihiro, N.3
Ohta, K.4
-
36
-
-
58349091571
-
Preimage attacks on 3, 4, and 5-pass HAVAL
-
Pieprzyk, J.P. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Sasaki, Y., Aoki, K.: Preimage attacks on 3, 4, and 5-pass HAVAL. In: Pieprzyk, J.P. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 253-271. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 253-271
-
-
Sasaki, Y.1
Aoki, K.2
-
37
-
-
67650679771
-
Finding Preimages in Full MD5 Faster than Exhaustive Search
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Sasaki, Y., Aoki, K.: Finding Preimages in Full MD5 Faster than Exhaustive Search. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 134-152. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5479
, pp. 134-152
-
-
Sasaki, Y.1
Aoki, K.2
-
38
-
-
43149097854
-
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
-
Malkin, T. (ed.) CT-RSA 2008. Springer, Heidelberg
-
Sasaki, Y., Wang, L., Ohta, K., Kunihiro, N.: Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. In: Malkin, T. (ed.) CT-RSA 2008. LNCS, vol. 4964, pp. 1-18. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4964
, pp. 1-18
-
-
Sasaki, Y.1
Wang, L.2
Ohta, K.3
Kunihiro, N.4
-
39
-
-
38049156019
-
Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities
-
Naor, M. (ed.) EUROCRYPT 2007. Springer, Heidelberg
-
Stevens, M., Lenstra, A.K., de Weger, B.: Chosen-Prefix Collisions for MD5 and Colliding X.509 Certificates for Different Identities. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 1-22. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4515
, pp. 1-22
-
-
Stevens, M.1
Lenstra, A.K.2
De Weger, B.3
-
40
-
-
70350346082
-
Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Stevens, M., Sotirov, A., Appelbaum, J., Lenstra, A., Molnar, D., Osvik, D.A., de Weger, B.: Short chosen-prefix collisions for MD5 and the creation of a rogue CA certificate. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 55-69. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 55-69
-
-
Stevens, M.1
Sotirov, A.2
Appelbaum, J.3
Lenstra, A.4
Molnar, D.5
Osvik, D.A.6
De Weger, B.7
-
41
-
-
84948973102
-
On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER
-
Preneel, B. (ed.) FSE 1994. Springer, Heidelberg
-
Vaudenay, S.: On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 286-297. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.1008
, pp. 286-297
-
-
Vaudenay, S.1
-
42
-
-
77954696858
-
Finding Preimages of Tiger Up to 23 Steps
-
Hong, S., Iwata, T. (eds.) FSE 2010. Springer, Heidelberg
-
Wang, L., Sasaki, Y.: Finding Preimages of Tiger Up to 23 Steps. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 116-133. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6147
, pp. 116-133
-
-
Wang, L.1
Sasaki, Y.2
-
43
-
-
24944575304
-
Cryptanalysis of the Hash Functions MD4 and RIPEMD
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the Hash Functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1-18. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
44
-
-
33745171465
-
Finding Collisions in the Full SHA-1
-
Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
-
Wang, X., Yin, Y.L., Yu, H.: Finding Collisions in the Full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
45
-
-
24944591357
-
How to Break MD5 and Other Hash Functions
-
Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
-
Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
-
46
-
-
33744827107
-
The Second-Preimage Attack on MD4
-
Desmedt, Y., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. Springer, Heidelberg
-
Yu, H., Wang, G., Zhang, G., Wang, X.: The Second-Preimage Attack on MD4. In: Desmedt, Y., Wang, H., Mu, Y., Li, Y. (eds.) CANS 2005. LNCS, vol. 3810, pp. 1-12. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3810
, pp. 1-12
-
-
Yu, H.1
Wang, G.2
Zhang, G.3
Wang, X.4
|