Second preimages on n-bit hash functions for much less than 2^n work

by John Kelsey , Bruce Schneier
Citations:18 - 3 self

Active Bibliography

Cryptographic Hash Functions: A Review – Rajeev Sobti, G. Geetha
861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
30 Herding hash functions and the Nostradamus attack – John Kelsey, Tadayoshi Kohno - 2006
503 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
806 Differential Power Analysis – Paul Kocher, Joshua Jaffe, Benjamin Jun - 1999
597 Short signatures from the Weil pairing – Dan Boneh, Ben Lynn, Hovav Shacham - 2001
1246 Identity-Based Encryption from the Weil Pairing – Dan Boneh, Matthew Franklin - 2001
519 Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks – Yih-chun Hu - 2003
827 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001