Assche. Sponge functions (2007)

Cached

Download Links

by Guido Bertoni , Joan Daemen , Michael Peeters , Gilles Van Assche , Guido Bertoni , Joan Daemen , Michaël Peeters , Gilles Van Assche
Citations:13 - 0 self

Active Bibliography

The Skein Hask Function Family – Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker - 2009
New Second Preimage Attacks on Hash Functions ⋆ – Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sebastien Zimmer
7 Domain extension of public random functions: Beyond the birthday barrier – Ueli Maurer, Stefano Tessaro - 2007
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
2 Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound – Charles Bouillaguet, Pierre-alain Fouque
7 Second Preimage Attacks on Dithered Hash Functions – Elena Andreeva, Charles Bouillaguet, Pierre-alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sebastien Zimmer
Cryptographic Hash Functions: A Review – Rajeev Sobti, G. Geetha
4 Slide Attacks on a Class of Hash Functions – Michael Gorski, Stefan Lucks, Thomas Peyrin - 2008
1 Edon–R, An Infinite Family of Cryptographic Hash Functions – Danilo Gligoroski, Smile Markovski, Ljupco Kocarev, Corresponding D. Gligoroski - 2006
Keysizes (2009-2010) Editor – Nigel Smart (bris, Ruhr-universität Bochum, Royal Holloway - 2008
Editor – unknown authors
Keysizes (2010-2011) Editor – Nigel Smart (bris, Ruhr-universität Bochum, Royal Holloway - 2008
Keysizes (2011-2012) Editor – Nigel Smart (bris, Ruhr-universität Bochum, Royal Holloway - 2008
ECRYPT Yearly Report on Algorithms and Keysizes (2007-2008) Editor Mats Näslund (ERICS) – Steve Babbage (vod, Dario Catalano (ens, Carlos Cid (rhul, Michael Ward (mastercard - 2008
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
9 Amplifying Collision Resistance: A Complexity-Theoretic Treatment – Ran Canetti, Madhu Sudan, Luca Trevisan, Salil Vadhan, Hoeteck Wee
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension – Donghoon Chang, Seokhie Hong, Jaechul Sung, Sangjin Lee
Security Analysis and Comparison of the SHA-3 Finalists – Elena Andreeva, Bart Mennink, Bart Preneel, Marjan ˇ Skrobot
25 Herding hash functions and the Nostradamus attack – John Kelsey, Tadayoshi Kohno - 2006