Assche. Sponge functions (2007)

Cached

Download Links

by Guido Bertoni , Joan Daemen , Michael Peeters , Gilles Van Assche , Guido Bertoni , Joan Daemen , Michaël Peeters , Gilles Van Assche
Citations:13 - 0 self

Documents Related by Co-Citation

48 Assche, On the Indifferentiability of the Sponge Construction – Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van - 2008
167 Finding collisions in the full SHA-1 – Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu - 2005
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
214 How to break MD5 and other hash functions – Xiaoyun Wang, Hongbo Yu - 2005
175 One way hash functions and DES – R Merkle - 1990
36 Dunkelman, A Framework for Iterative Hash Functions – Eli Biham, Orr
24 The rebound attack: Cryptanalysis of reduced Whirlpool and Grøstl – F Mendel, C Rechberger, M Schläffer, S S Thomsen
103 Black-box analysis of the block-cipher-based hash-function constructions from pgv – John Black, Phillip Rogaway, Thomas Shrimpton - 2002
71 Hash functions based on block ciphers: A synthetic approach – Bart Preneel, René Govaerts, Joos Vandewalle - 1993
10 Abelian square-free dithering for iterated hash functions”, Presented at ECrypt Hash Function Workshop – Ron Rivest
11 Assche. The Keccak SHA-3 submission – Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van - 2011
5 A sat-based preimage analysis of reduced keccak hash functions. http://eprint.iacr.org/2010/285, 2010. pawelm@wsh-kielce.edu.pl 14742 received 13 – Pawel Morawiecki, Marian Srebrny - 2010
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
20 The PHOTON Family of Lightweight Hash Functions – Jian Guo, Thomas Peyrin, Axel Poschmann - 2011
59 Multi-Property-Preserving Hash Domain Extension and the EMD Transform – Mihir Bellare, Thomas Ristenpart - 2006
27 Keccak sponge function family main document version 2.1. http://keccak.noekeon.org – G Bertoni, J Daemen, M Peeters, G V Assche - 2010
3 Multicollision attack on the compression functions – Hongbo Yu, Xiaoyun Wang - 2007
27 Cryptanalysis of the hash functions MD4 and RIPEMD – Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, Xiuyuan Yu - 2005
4 Security proofs for the MD6 hash function mode of operation – C Y Crutchfield