메뉴 건너뛰기




Volumn 62, Issue 1, 2012, Pages 1-18

Memoryless near-collisions via coding theory

Author keywords

Covering codes; Cycle finding algorithms; Hash functions; Near collisions

Indexed keywords

COMPUTER PROGRAMMING;

EID: 84856209903     PISSN: 09251022     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10623-011-9484-2     Document Type: Article
Times cited : (9)

References (31)
  • 1
    • 0036713329 scopus 로고    scopus 로고
    • Random codes: Minimum distances and error exponents
    • DOI 10.1109/TIT.2002.800480, PII 1011092002800480
    • A. Barg G.D. Forney Jr. 2002 Random codes: minimum distances and error exponents IEEE Trans. Inf. Theory 48 9 2568 2573 10.1109/TIT.2002.800480 1062.94005 1929465 (Pubitemid 35032681)
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.9 , pp. 2568-2573
    • Barg, A.1    Forney Jr., G.D.2
  • 2
    • 0040553594 scopus 로고
    • An improved Monte Carlo factorization algorithm
    • 10.1007/BF01933190 0439.65001 583032
    • R.P. Brent 1980 An improved Monte Carlo factorization algorithm BIT 20 2 176 184 10.1007/BF01933190 0439.65001 583032
    • (1980) BIT , vol.20 , Issue.2 , pp. 176-184
    • Brent, R.P.1
  • 6
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • G. Brassard (eds). Springer Heidelberg
    • Damgård I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO, Lecture Notes in Computer Science, vol. 435, pp. 416-427. Springer, Heidelberg (1989)
    • (1989) CRYPTO, Lecture Notes in Computer Science, Vol. 435 , pp. 416-427
    • Damgård, I.1
  • 7
    • 84985796089 scopus 로고
    • Collisions for the compression function of MD5
    • G. Goos J. Hartmanis (eds). Springer Heidelberg
    • den Boer B., Bosselaers A.: Collisions for the compression function of MD5. In: Goos, G., Hartmanis, J. (eds) EUROCRYPT, Lecture Notes in Computer Science, vol. 765, pp. 293-304. Springer, Heidelberg (1993)
    • (1993) EUROCRYPT, Lecture Notes in Computer Science, Vol. 765 , pp. 293-304
    • Den Boer, B.1    Bosselaers, A.2
  • 8
    • 77949530882 scopus 로고    scopus 로고
    • Optimal hash functions for approximate matches on the n-cube
    • 10.1109/TIT.2009.2039037 2723654
    • D. Gordon V. Miller P. Ostapenko 2010 Optimal hash functions for approximate matches on the n-cube IEEE Trans. Inform. Theory 56 3 984 991 10.1109/TIT.2009.2039037 2723654
    • (2010) IEEE Trans. Inform. Theory , vol.56 , Issue.3 , pp. 984-991
    • Gordon, D.1    Miller, V.2    Ostapenko, P.3
  • 9
    • 0022054679 scopus 로고
    • On the covering radius of codes
    • 10.1109/TIT.1985.1057039 0585.94012 794436
    • R.L. Graham N.J.A. Sloane 1985 On the covering radius of codes IEEE Trans. Inform. Theory 31 3 385 401 10.1109/TIT.1985.1057039 0585.94012 794436
    • (1985) IEEE Trans. Inform. Theory , vol.31 , Issue.3 , pp. 385-401
    • Graham, R.L.1    Sloane, N.J.A.2
  • 10
    • 0000702490 scopus 로고
    • Probability distributions related to random mappings
    • 10.1214/aoms/1177705677 0158.34905
    • B. Harris 1960 Probability distributions related to random mappings Ann. Math. Stat. 31 1045 1062 10.1214/aoms/1177705677 0158.34905
    • (1960) Ann. Math. Stat. , vol.31 , pp. 1045-1062
    • Harris, B.1
  • 13
    • 0022029028 scopus 로고
    • Generating strong one-way functions with crypographic algorithm
    • S.M. Matyas C.H. Meyer J. Oseas 1985 Generating strong one-way functions with crypographic algorithm IBM Tech. Discl. Bull. 27 10A 5658 5659
    • (1985) IBM Tech. Discl. Bull. , vol.27 , Issue.10 , pp. 5658-5659
    • Matyas, S.M.1    Meyer, C.H.2    Oseas, J.3
  • 14
    • 70350426602 scopus 로고    scopus 로고
    • On free-start collisions and collisions for TIB3
    • Samarati P., Yung M., Martinelli F., Ardagna C.A. (ed) Springer, Heidelberg
    • Mendel F., Schläffer M.: On free-start collisions and collisions for TIB3. In: Samarati P., Yung M., Martinelli F., Ardagna C.A. (ed) ISC, Lecture Notes in Computer Science, vol. 5735, pp. 95-106. Springer, Heidelberg (2009).
    • (2009) ISC, Lecture Notes in Computer Science , vol.5735 , pp. 95-106
    • Mendel, F.1
  • 16
    • 84937461306 scopus 로고
    • One way hash functions and des
    • Brassard G. (ed.) Springer, Heidelberg
    • Merkle R.C.: One way hash functions and DES. In: Brassard G. (ed.) CRYPTO, Lecture Notes in Computer Science, vol. 435, pp. 428-446. Springer, Heidelberg (1989).
    • (1989) CRYPTO, Lecture Notes in Computer Science , vol.435 , pp. 428-446
    • Merkle, R.C.1
  • 20
    • 1842610602 scopus 로고    scopus 로고
    • Cycle detection using a stack
    • 10.1016/j.ipl.2004.01.016 1178.68648 2052030
    • G. Nivasch 2004 Cycle detection using a stack Inf. Process. Lett. 90 3 135 140 10.1016/j.ipl.2004.01.016 1178.68648 2052030
    • (2004) Inf. Process. Lett. , vol.90 , Issue.3 , pp. 135-140
    • Nivasch, G.1
  • 22
    • 84966238549 scopus 로고
    • Monte Carlo methods for index computation (mod p)
    • 0382.10001 491431
    • J.M. Pollard 1978 Monte Carlo methods for index computation (mod p) Math. Comp. 32 143 918 924 0382.10001 491431
    • (1978) Math. Comp. , vol.32 , Issue.143 , pp. 918-924
    • Pollard, J.M.1
  • 23
    • 50049107054 scopus 로고
    • How easy is collision search. new results and applications to des
    • Brassard G. (ed.) Springer, Heidelberg
    • Quisquater J.-J., Delescaille J.-P.: How easy is collision search. new results and applications to DES. In: Brassard G. (ed.) CRYPTO Lecture Notes in Computer Science, vol. 435, pp. 408-413. Springer, Heidelberg (1989).
    • (1989) CRYPTO Lecture Notes in Computer Science , vol.435 , pp. 408-413
    • Quisquater, J.-J.1    Delescaille, J.-P.2
  • 25
    • 0028462216 scopus 로고
    • An improvement of the Van Wee bound for binary linear covering codes
    • 10.1109/18.335936 0813.94023 1301433
    • R. Struik 1994 An improvement of the Van Wee bound for binary linear covering codes IEEE Trans. Inform. Theory 40 4 1280 1284 10.1109/18.335936 0813.94023 1301433
    • (1994) IEEE Trans. Inform. Theory , vol.40 , Issue.4 , pp. 1280-1284
    • Struik, R.1
  • 26
    • 84955586695 scopus 로고    scopus 로고
    • Improving implementable meet-in-The-middle attacks by orders of magnitude
    • Advances in Cryptology - CRYPTO '96
    • van Oorschot P.C., Wiener M.J.: Improving implementable meet-in-the-middle attacks by orders of magnitude. In: Koblitz N. (ed.) CRYPTO, Lecture Notes in Computer Science, vol. 1109, pp. 229-236. Springer, Heidelberg (1996). (Pubitemid 126106243)
    • (1996) Lecture Notes in Computer Science , Issue.1109 , pp. 229-236
    • Van Oorschot, P.C.1    Wiener, M.J.2
  • 27
    • 17444376558 scopus 로고    scopus 로고
    • Parallel collision search with cryptanalytic applications
    • 10.1007/PL00003816 0992.94028
    • P.C. van Oorschot M.J. Wiener 1999 Parallel collision search with cryptanalytic applications J. Cryptol. 12 1 1 28 10.1007/PL00003816 0992.94028
    • (1999) J. Cryptol. , vol.12 , Issue.1 , pp. 1-28
    • Van Oorschot, P.C.1    Wiener, M.J.2
  • 28
    • 0023981711 scopus 로고
    • Improved sphere bounds on the covering radius of codes
    • DOI 10.1109/18.2632
    • G.J.M. van Wee 1988 Improved sphere bounds on the covering radius of codes IEEE Trans. Inform. Theory 34 2 237 245 10.1109/18.2632 0653.94014 945316 (Pubitemid 18639976)
    • (1988) IEEE Transactions on Information Theory , vol.34 , Issue.2 , pp. 237-245
    • Van Wee Gerhard, J.M.1
  • 29
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Wang X., Yu H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT, Lecture Notes in Computer Science, vol. 3494, pp. 19-35. Springer, Heidelberg (2005) (Pubitemid 41313944)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 31
    • 84950781609 scopus 로고
    • How to swindle Rabin?
    • 10.1080/0161-117991854025
    • G. Yuval 1979 How to swindle Rabin? Cryptologia 3 3 187 191 10.1080/0161-117991854025
    • (1979) Cryptologia , vol.3 , Issue.3 , pp. 187-191
    • Yuval, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.