Second preimages on n-bit hash functions for much less than 2^n work

by John Kelsey , Bruce Schneier
Citations:15 - 3 self

Active Bibliography

Cryptographic Hash Functions: A Review – Rajeev Sobti, G. Geetha
25 Herding hash functions and the Nostradamus attack – John Kelsey, Tadayoshi Kohno - 2006
15 On the impossibility of efficiently combining collision resistant hash functions – Dan Boneh, Xavier Boyen - 2006
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
15 Building a collision-resistant compression function from non-compressing primitives – Thomas Shrimpton, Martijn Stam - 2008
6 On the Security of Tandem-DM – Ewan Fleischmann, Michael Gorski, Stefan Lucks
3 Blockcipher Based Hashing Revisited – Martijn Stam - 2009
26 On the impossibility of highly-efficient blockcipher-based hash functions – John Black, Martin Cochran, Thomas Shrimpton - 2005
18 Constructing cryptographic hash functions from fixed-key blockciphers. Full version of this paper – Phillip Rogaway, John Steinberger - 2008
On the (In)Security of IDEA in Various Hashing Modes ⋆ – Lei Wei, Thomas Peyrin, San Ling, Josef Pieprzyk, Huaxiong Wang
Efficient Hashing using the AES Instruction Set – Onur Özen, Martijn Stam
27 Hash function balance and its impact on birthday attacks – Mihir Bellare, Tadayoshi Kohno - 2004
Summary – Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen - 2008
Symmetric Cryptography – Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen - 2009
58 Strengthening Digital Signatures Via Randomized Hashing – Shai Halevi, Hugo Krawczyk - 2006
Prashant PuniyaThe Random Oracle Methodology – Jean-sebastien Coron, Yevgeniy Dodis, Cecile Malinaud
A note on the security proof of Knudsen-Preneel construction of a hash function – Dai Watanabe
5 A new mode of operation for block ciphers and length-preserving MACs – Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya - 2008
74 Merkle-Damg˚ard Revisited: How to Construct a Hash Function – Jean-sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya