Hash function balance and its impact on birthday attacks (2004)

by Mihir Bellare , Tadayoshi Kohno
Venue:Advances in Cryptology – EUROCRYPT ’04, Lecture Notes in Computer Science
Citations:29 - 2 self

Documents Related by Co-Citation

312 A Design Principle for Hash Functions – I Damgård - 1989
1425 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
2724 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
503 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
875 The MD5 message-digest algorithm – R Rivest - 1992
686 Cryptography and Network security: Principles and Practices – William Stallings - 1999
861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
1233 A public key cryptosystem and a signature scheme based on discrete logarithms – Taher Elgamal - 1985
1241 Probabilistic encryption – S Goldwasser, S Micali - 1984