Hash function balance and its impact on birthday attacks (2004)

by Mihir Bellare , Tadayoshi Kohno
Venue:Advances in Cryptology – EUROCRYPT ’04, Lecture Notes in Computer Science
Citations:27 - 2 self

Documents Related by Co-Citation

289 A Design Principle for Hash Functions – Ivan Damg˚ard - 1990
103 Black-box analysis of the block-cipher-based hash-function constructions from pgv – John Black, Phillip Rogaway, Thomas Shrimpton - 2002
175 One way hash functions and DES – R Merkle - 1990
40 Preimages on n-Bit Hash Functions for Much Less than 2 n Work”, EUROCRYPT – John Kelsey, Bruce Schneier, “Second - 2005
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
110 Analysis and Design of Cryptographic Hash Functions – B Preneel - 1993
28 Some Observations on the Theory of Cryptographic Hash Functions – D.R. Stinson - 2001
73 Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance – P. Rogaway, T. Shrimpton - 2004
25 Design Validations for Discrete Logarithm Based Signature Schemes – Ernest Brickell, David Pointcheval, Serge Vaudenay, Moti Yung - 2000
6 Complexity and Cryptography an Introduction – J Talnor, D Welsh
33 Introduction to Cryptography – J A Buchmann - 2004
77 A new forward-secure digital signature scheme – Michel Abdalla, Leonid Reyzin - 2000
58 Strengthening Digital Signatures Via Randomized Hashing – Shai Halevi, Hugo Krawczyk - 2006
77 Applied Cryptography Second Edition: protocols, algorithms, and source code in C – B Schneier - 1996
61 The Interpolation Attack on Block Ciphers – Thomas Jakobsen, Lars R. Knudsen - 1997
65 Links Between Differential and Linear Cryptanalysis – Florent Chabaud, Florent Chabaud, Florent Chabaud, Serge Vaudenay, Serge Vaudenay, Serge Vaudenay, Groupe Recherche, Groupe Recherche, En Complexit'e Cryptographie, En Complexit'e Cryptographie - 1994
48 Advanced Slide Attacks – Alex Biryukov, David Wagner - 2000