Active Bibliography

1 Y.: An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions. Cryptology ePrint Archive, Report 2009/506 – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2009
2 A Three-Property-Secure Hash Function – Elena Andreeva, Bart Preneel
structures to cryptography – unknown authors - 2009
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
3 New Parallel Domain Extenders for UOWHF – Wonil Lee, Donghoon Chang, Sangjin Lee, Soohak Sung, Mridul Nandi
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption ∗ – Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang - 2006
The Skein Hask Function Family – Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker - 2009
1 Cryptography in Constant Parallel Time – Benny Applebaum - 2007
25 Herding hash functions and the Nostradamus attack – John Kelsey, Tadayoshi Kohno - 2006
Revisiting Dedicated and Block Cipher based Hash Functions – Anupam Pattanayak
A Sufficient Condition and an Optimal Domain Extension of UOWHF – Mridul Nandi - 2004
16 Hash Functions: From Merkle-Damgård to Shoup – Ilya Mironov - 2001
2 Construction of UOWHF: Tree Hashing Revisited – Palash Sarkar - 2002
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008
New Second Preimage Attacks on Hash Functions ⋆ – Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sebastien Zimmer
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2 Y.: Enhanced Security Notions for DedicatedKey Hash Functions: Definitions and Relationships – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2005
13 Assche. Sponge functions – Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche, Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche - 2007