Collision and Preimage Resistance of the Centera Content Address (2005)

Cached

Download Links

by Robert Primmer, et al.
Citations:4 - 0 self

Active Bibliography

11 On Recent Results for MD2, MD4 and MD5 – Matt Robshaw, M. J. B. Robshaw - 1996
3 A critical look at cryptographic hash function literature – Scott Contini, Ron Steinfeld, Josef Pieprzyk, Krystian Matusiewicz - 2007
2 3C -- A Provably Secure Pseudorandom Function and Message Authentication Code. A New mode of operation for Cryptographic Hash Function – Praveen Gauravaram, William Millan, Juanma Gonzalez Neito, Edward Dawson - 2005
CryptoBytes – The Technical Newsletter
1 The Cryptographic Hash Function RIPEMD-160 – Bart Preneel, Hans Dobbertin, Antoon Bosselaers
2 Collision Attacks on MD5 and SHA-1: Is this the “Sword of Damocles" for Electronic Commerce? – Praveen Gauravaram, Adrian McCullagh, Ed Dawson - 2006
5 On the Security of Dedicated Hash Functions – Bart Van Rompay, Bart Preneel, Joos Vandewalle - 1998
42 A failure-friendly design principle for hash functions – Stefan Lucks - 2005
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
2 New Integrated proof method on Iterated Hash Structure and New Structures – Duo Lei - 2006
6 Multicollision Attacks on a Class of Hash Functions – M. Nandi, D. R. Stinson - 2005
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008
13 Assche. Sponge functions – Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van Assche, Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche - 2007
unknown title – unknown authors - 2004
On the Design of Secure and Fast Double Block Length Hash Functions – Zheng Gong, Xuejia Lai, Kefei Chen
Evaluation on Recent committed Crypt Analysis Hash Function – A. Arul, Lawrence Selvakumar, C. Suresh Gan
A Study of Crypt analysis Hash function – A. Arul, Lawrence Selvakumar, C. Suresh Gan
15 Cryptanalysis of MD5 Compress – Hans Dobbertin - 1996
2 Constructing Secure Hash Functions from Weak Compression Functions: The Case for Non-Streamable Hash Functions – Moses Liskov - 2006