메뉴 건너뛰기




Volumn 6544 LNCS, Issue , 2011, Pages 187-197

Optimal covering codes for finding near-collisions

Author keywords

covering codes; digital expansions; direct sum construction; Hash functions; memoryless near collisions

Indexed keywords

CODING THEORY; COVERING CODES; CRYPTOGRAPHIC HASH FUNCTIONS; DIGITAL EXPANSIONS; DIRECT SUM; GENERIC METHOD; MEMORYLESS; NEAR-COLLISIONS; OPTIMAL SOLUTIONS;

EID: 79952608890     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-19574-7_13     Document Type: Conference Paper
Times cited : (4)

References (24)
  • 1
    • 35048892549 scopus 로고    scopus 로고
    • Near-Collisions of SHA-0
    • Franklin, M. (ed.), Springer, Heidelberg
    • Biham, E., Chen, R.: Near-Collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290-305. Springer, Heidelberg (2004)
    • (2004) CRYPTO 2004. LNCS , vol.3152 , pp. 290-305
    • Biham, E.1    Chen, R.2
  • 2
    • 0040553594 scopus 로고
    • An improved Monte Carlo factorization algorithm
    • Brent, R.P.: An improved Monte Carlo factorization algorithm. BIT 20(2), 176-184 (1980)
    • (1980) BIT , vol.20 , Issue.2 , pp. 176-184
    • Brent, R.P.1
  • 3
    • 84957643546 scopus 로고    scopus 로고
    • Differential Collisions in SHA-0
    • Advances in Cryptology - CRYPTO '98
    • Chabaud, F., Joux, A.: Differential Collisions in SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56-71. Springer, Heidelberg (1998) (Pubitemid 128118997)
    • (1998) Lecture Notes in Computer Science , Issue.1462 , pp. 56-71
    • Chabaud, F.1    Joux, A.2
  • 4
    • 0004222925 scopus 로고    scopus 로고
    • North-Holland Mathematical Library, North-Holland Publishing Co., Amsterdam
    • Cohen, G., Honkala, I., Litsyn, S., Lobstein, A.: Covering codes. North-Holland Mathematical Library, vol. 54. North-Holland Publishing Co., Amsterdam (1997)
    • (1997) Covering Codes , vol.54
    • Cohen, G.1    Honkala, I.2    Litsyn, S.3    Lobstein, A.4
  • 6
    • 38049183978 scopus 로고    scopus 로고
    • Finding SHA-1 characteristics: General results and applications
    • Lai, X., Chen, K. (eds.), Springer, Heidelberg
    • De Cannìere, C., Rechberger, C.: Finding SHA-1 Characteristics: General Results and Applications. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 1-20. Springer, Heidelberg (2006)
    • (2006) ASIACRYPT 2006. LNCS , vol.4284 , pp. 1-20
    • De Cannìere, C.1    Rechberger, C.2
  • 7
    • 0005268716 scopus 로고    scopus 로고
    • Cryptanalysis of MD4
    • Dobbertin, H.: Cryptanalysis of MD4. J. Cryptology 11(4), 253-271 (1998) (Pubitemid 128728056)
    • (1998) Journal of Cryptology , vol.11 , Issue.4 , pp. 253-271
    • Dobbertin, H.1
  • 10
    • 77949530882 scopus 로고    scopus 로고
    • Optimal hash functions for approximate matches on the n-cube
    • Gordon, D., Miller, V., Ostapenko, P.: Optimal hash functions for approximate matches on the n-cube. IEEE Trans. Inform. Theory 56(3), 984-991 (2010)
    • (2010) IEEE Trans. Inform. Theory , vol.56 , Issue.3 , pp. 984-991
    • Gordon, D.1    Miller, V.2    Ostapenko, P.3
  • 14
    • 70350426602 scopus 로고    scopus 로고
    • On free-start collisions and collisions for TIB3
    • Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.), Springer, Heidelberg
    • Mendel, F., Schläffer, M.: On Free-Start Collisions and Collisions for TIB3. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 95-106. Springer, Heidelberg (2009)
    • (2009) ISC 2009. LNCS , vol.5735 , pp. 95-106
    • Mendel, F.1    Schläffer, M.2
  • 16
    • 50249181288 scopus 로고    scopus 로고
    • National Institute of Standards and Technology (NIST)
    • National Institute of Standards and Technology (NIST). Cryptographic Hash Project (2007), http://www.nist.gov/hash-competition
    • (2007) Cryptographic Hash Project
  • 17
    • 1842610602 scopus 로고    scopus 로고
    • Cycle detection using a stack
    • Nivasch, G.: Cycle detection using a stack. Inf. Process. Lett. 90(3), 135-140 (2004)
    • (2004) Inf. Process. Lett. , vol.90 , Issue.3 , pp. 135-140
    • Nivasch, G.1
  • 19
    • 0028462216 scopus 로고
    • An improvement of the VanWee bound for binary linear covering codes
    • Struik, R.: An improvement of the VanWee bound for binary linear covering codes. IEEE Transactions on Information Theory 40(4), 1280-1284 (1994)
    • (1994) IEEE Transactions on Information Theory , vol.40 , Issue.4 , pp. 1280-1284
    • Struik, R.1
  • 20
    • 17444376558 scopus 로고    scopus 로고
    • Parallel collision search with cryptanalytic applications
    • van Oorschot, P.C., Wiener, M.J.: Parallel Collision Search with Cryptanalytic Applications. J. Cryptology 12(1), 1-28 (1999)
    • (1999) J. Cryptology , vol.12 , Issue.1 , pp. 1-28
    • Van Oorschot, P.C.1    Wiener, M.J.2
  • 21
    • 0023981711 scopus 로고
    • Improved sphere bounds on the covering radius of codes
    • van Wee, G.J.M.: Improved sphere bounds on the covering radius of codes. IEEE Transactions on Information Theory 34(2), 237-245 (1988)
    • (1988) IEEE Transactions on Information Theory , vol.34 , Issue.2 , pp. 237-245
    • Van Wee, G.J.M.1
  • 23
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005) (Pubitemid 41313944)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 24
    • 84950781609 scopus 로고
    • How to swindle Rabin?
    • Yuval, G.: How to swindle Rabin? Cryptologia 3(3), 187-191 (1979)
    • (1979) Cryptologia , vol.3 , Issue.3 , pp. 187-191
    • Yuval, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.