Second preimages on n-bit hash functions for much less than 2^n work

by John Kelsey , Bruce Schneier
Citations:15 - 3 self

Active Bibliography

Cryptographic Hash Functions: A Review – Rajeev Sobti, G. Geetha
25 Herding hash functions and the Nostradamus attack – John Kelsey, Tadayoshi Kohno - 2006
15 On the impossibility of efficiently combining collision resistant hash functions – Dan Boneh, Xavier Boyen - 2006
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
15 Building a collision-resistant compression function from non-compressing primitives – Thomas Shrimpton, Martijn Stam - 2008
6 On the Security of Tandem-DM – Ewan Fleischmann, Michael Gorski, Stefan Lucks
3 Blockcipher Based Hashing Revisited – Martijn Stam - 2009
On the (In)Security of IDEA in Various Hashing Modes ⋆ – Lei Wei, Thomas Peyrin, San Ling, Josef Pieprzyk, Huaxiong Wang
Efficient Hashing using the AES Instruction Set – Onur Özen, Martijn Stam
27 On the impossibility of highly-efficient blockcipher-based hash functions – John Black, Martin Cochran, Thomas Shrimpton - 2005
19 Constructing cryptographic hash functions from fixed-key blockciphers. Full version of this paper – Phillip Rogaway, John Steinberger - 2008
27 Hash function balance and its impact on birthday attacks – Mihir Bellare, Tadayoshi Kohno - 2004
Summary – Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen - 2008
Symmetric Cryptography – Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen - 2009
58 Strengthening Digital Signatures Via Randomized Hashing – Shai Halevi, Hugo Krawczyk - 2006
1 New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru – Eli Biham
5 A new mode of operation for block ciphers and length-preserving MACs – Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya - 2008
Prashant PuniyaThe Random Oracle Methodology – Jean-sebastien Coron, Yevgeniy Dodis, Cecile Malinaud
A note on the security proof of Knudsen-Preneel construction of a hash function – Dai Watanabe