Do broken hash functions affect the security of time-stamping schemes (2006)

by Ahto Buldas , Sven Laur
Venue:In Proc. of ACNS’06, LNCS 3989
Citations:8 - 3 self

Active Bibliography

1 Does Secure Time-Stamping Imply Collision-Free Hash Functions? – Ahto Buldas, Aivo Jürgenson
2 Collision Attacks on MD5 and SHA-1: Is this the “Sword of Damocles" for Electronic Commerce? – Praveen Gauravaram, Adrian McCullagh, Ed Dawson - 2006
25 Herding hash functions and the Nostradamus attack – John Kelsey, Tadayoshi Kohno - 2006
• Option #2: Re-design affected protocols – Michael Szydlo, Yiqun Lisa Yin
3 Collision-Resistant usage of MD5 and SHA-1 via Message Preprocessing – Michael Szydlo, Yiqun Lisa Yin - 2005
structures to cryptography – unknown authors - 2009
9 Amplifying Collision Resistance: A Complexity-Theoretic Treatment – Ran Canetti, Madhu Sudan, Luca Trevisan, Salil Vadhan, Hoeteck Wee
15 Analysis of step-reduced SHA-256 – Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen - 2006
38 Finding SHA-1 Characteristics: General Results and Applications – Christophe De Cannière, Christian Rechberger
The Skein Hask Function Family – Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker - 2009
58 Strengthening Digital Signatures Via Randomized Hashing – Shai Halevi, Hugo Krawczyk - 2006
2 Constructing Secure Hash Functions from Weak Compression Functions: The Case for Non-Streamable Hash Functions – Moses Liskov - 2006
Chinese Academy of Sciences – Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu
9 Constructing an Ideal Hash Function from Weak Ideal Compression Functions – Moses Liskov - 2006
8 Preimages for Step-Reduced SHA-2 – Jian Guo, Krystian Matusiewicz
1 Y.: An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions. Cryptology ePrint Archive, Report 2009/506 – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2009
9 Non-trivial black-box combiners for collision-resistant hash-functions don’t exist – Krzysztof Pietrzak - 2007
42 A failure-friendly design principle for hash functions – Stefan Lucks - 2005
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford