-
1
-
-
85175030807
-
The polyl305-AES message-authentication code
-
D. Bernstein. The polyl305-AES message-authentication code. FSE 2005.
-
(2005)
FSE
-
-
Bernstein, D.1
-
2
-
-
85175059489
-
Multi-property-preserving hash domain extension: The EMD transform
-
M. Bellare, T. Ristenpart. Multi-property-preserving hash domain extension: The EMD transform. Asiacrypt 2006.
-
(2006)
Asiacrypt
-
-
Bellare, M.1
Ristenpart, T.2
-
3
-
-
33745598852
-
Collisions of SHA-0 and reduced SHA-1
-
E. Biham, R. Chen, A. Joux, P. Carribault, C. Lemuet, W. Jalby. Collisions of SHA-0 and reduced SHA-1. Eurocrypt 2005.
-
(2005)
Eurocrypt
-
-
Biham, E.1
Chen, R.2
Joux, A.3
Carribault, P.4
Lemuet, C.5
Jalby, W.6
-
5
-
-
84883697863
-
Black-box analysis of the block-cipher based hash-function construction from PGV
-
Crypto 02
-
J. Black, P. Rogaway, T. Shrimpton. Black-box analysis of the block-cipher based hash-function construction from PGV. Crypto 02.
-
-
-
Black, J.1
Rogaway, P.2
Shrimpton, T.3
-
6
-
-
85175060736
-
The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function
-
J. Black. The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function. FSE 2006.
-
(2006)
FSE
-
-
Black, J.1
-
9
-
-
0001744332
-
A design principle for hash functions
-
I. Damgård. A design principle for hash functions. Crypto 89.
-
Crypto
, vol.89
-
-
Damgård, I.1
-
10
-
-
85175013895
-
Square hash: fast message authentication via optimized universal hash functions
-
M. Etzel, S. Patel, Z. Ramzan. Square hash: fast message authentication via optimized universal hash functions. Crypto’99.
-
Crypto’99
-
-
Etzel, M.1
Patel, S.2
Ramzan, Z.3
-
11
-
-
33750056864
-
Some Plausible Constructions of Double-Block-Length Hash Functions
-
S. Hirose. Some Plausible Constructions of Double-Block-Length Hash Functions. FSE 2006.
-
(2006)
FSE
-
-
Hirose, S.1
-
12
-
-
24944577209
-
Multicollisions in iterated hash functions, application to cascaded constructions
-
Crypto 04
-
A. Joux. Multicollisions in iterated hash functions, application to cascaded constructions. Crypto 04.
-
-
-
Joux, A.1
-
13
-
-
38149097194
-
Herding Hash Functions and the Nostradamus Attack
-
J. Kelsey, T. Kohno. Herding Hash Functions and the Nostradamus Attack. Eurocrypt 2006.
-
(2006)
Eurocrypt
-
-
Kelsey, J.1
Kohno, T.2
-
15
-
-
84862469656
-
CWC: a high performance conventional authenticared encryption mode
-
FSE 04
-
T. Kohno, J. Viega, D. Whiting. CWC: a high performance conventional authenticared encryption mode. FSE 04.
-
-
-
Kohno, T.1
Viega, J.2
Whiting, D.3
-
16
-
-
85175029826
-
Constructing an Ideal Hash Function from Weak Ideal Compression Functions
-
M. Liskov. Constructing an Ideal Hash Function from Weak Ideal Compression Functions. SAC 2006.
-
(2006)
SAC
-
-
Liskov, M.1
-
17
-
-
63749125877
-
A Failure-Friendly Design Principle for Hash Functions
-
S. Lucks. A Failure-Friendly Design Principle for Hash Functions. Asiacrypt 2005.
-
(2005)
Asiacrypt
-
-
Lucks, S.1
-
18
-
-
0005663765
-
Faster Luby-Rackoff Ciphers
-
S. Lucks. Faster Luby-Rackoff Ciphers. FSE 1996.
-
(1996)
FSE
-
-
Lucks, S.1
-
20
-
-
0000966673
-
One-way hash functions and DES
-
R. Merkle. One-way hash functions and DES. Crypto 89.
-
Crypto
, vol.89
-
-
Merkle, R.1
-
21
-
-
0003064824
-
On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited
-
M. Naor, O. Reingold. On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited. J. Cryptology 12(1) 29-66 (1999).
-
(1999)
J. Cryptology
, vol.12
, Issue.1
, pp. 29-66
-
-
Naor, M.1
Reingold, O.2
-
22
-
-
85175069793
-
Hash functions based on block ciphers: A syntetic approach
-
B. Preneel, R. Govaerts, R. Vanderwalle. Hash functions based on block ciphers: A syntetic approach. Crypto 93.
-
Crypto
, vol.93
-
-
Preneel, B.1
Govaerts, R.2
Vanderwalle, R.3
-
24
-
-
27644501857
-
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision-Resistance
-
P. Rogaway and T. Shrimpton. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision-Resistance. FSE 2004.
-
(2004)
FSE
-
-
Rogaway, P.1
Shrimpton, T.2
-
26
-
-
33745179728
-
How to break MD5 and other hash functions
-
X. Wang, H. Yu. How to break MD5 and other hash functions. Eurocrypt 2005.
-
(2005)
Eurocrypt
-
-
Wang, X.1
Yu, H.2
-
27
-
-
33745179728
-
Efficient collision search attacks on SHA0
-
X. Wang, H. Yu, Y. L. Yin. Efficient collision search attacks on SHA0. Crypto 2005.
-
(2005)
Crypto
-
-
Wang, X.1
Yu, H.2
Yin, Y. L.3
-
28
-
-
33646754186
-
Finding collisions in the full SHA1
-
X. Wang, Y. L. Yin, H. Yu. Finding collisions in the full SHA1. Crypto 2005.
-
(2005)
Crypto
-
-
Wang, X.1
Yin, Y. L.2
Yu, H.3
-
29
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
M. Wegman, J. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, Vol. 22, 1981, 265–279.
-
(1981)
Journal of Computer and System Sciences
, vol.22
, pp. 265-279
-
-
Wegman, M.1
Carter, J.2
|