Second preimages on n-bit hash functions for much less than 2^n work

by John Kelsey , Bruce Schneier
Citations:15 - 3 self

Documents Related by Co-Citation

289 A Design Principle for Hash Functions – Ivan Damg˚ard - 1990
46 Formal Aspects of Mobile Code Security – R D Dean - 1999
25 Herding hash functions and the Nostradamus attack – John Kelsey, Tadayoshi Kohno - 2006
93 Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions – A Joux - 2004
98 Collision-resistant hashing: Towards making UOWHFs practical – Mihir Bellare, Philip Rogaway - 1997
58 Strengthening Digital Signatures Via Randomized Hashing – Shai Halevi, Hugo Krawczyk - 2006
59 Multi-Property-Preserving Hash Domain Extension and the EMD Transform – Mihir Bellare, Thomas Ristenpart - 2006
167 Finding collisions in the full SHA-1 – Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu - 2005
214 How to break MD5 and other hash functions – Xiaoyun Wang, Hongbo Yu - 2005
36 Dunkelman, A Framework for Iterative Hash Functions – Eli Biham, Orr
36 Finding SHA-1 Characteristics: General Results and Applications – Christophe De Cannière, Christian Rechberger
4 Joux, Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions – Antoine
12 and Tadayoshi Kohno. Herding Hash Functions and the Nostradamus Attack – John Kelsey - 2006
13 Another Birthday Attack – D Coppersmith - 1986
21 Improved time-memory trade-offs with multiple data – A Biryukov, S Mukhopadhyay, P Sarkar - 2006
88 Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers – Alex Biryukov, Adi Shamir - 1976
9 Breaking the ICE - finding multicollisions in iterated concatenated and expanded (ICE) hash functions – Jonathan J. Hoch, Adi Shamir - 2006
22 Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions", Cryptology ePrint Report 2006/319 – Scott Contini, Yiqun Lisa Yin - 2006
175 One way hash functions and DES – R Merkle - 1990