Parallel collision search with application to hash functions and discrete logarithms (1994)

Cached

Download Links

by Paul C. Van Oorschot , Michael J. Wiener
Venue:In ACM CCS 94
Citations:59 - 1 self

Documents Related by Co-Citation

2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
75 The Status of MD5 After a Recent Attack – H Dobbertin - 1996
55 Collisions for the compression function of MD5 – Bert den Boer, Antoon Bosselaers - 1993
289 A Design Principle for Hash Functions – Ivan Damg˚ard - 1990
175 One way hash functions and DES – R Merkle - 1990
38 An Attack on the Last Two Rounds of MD4 – Bert den Boer, Antoon Bosselaers - 1991
103 RIPEMD-160: A Strengthened Version of RIPEMD – Hans Dobbertin, Antoon Bosselaers, Bart Preneel - 1996
92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
57 The MD5 Message-Digest Algorithm", RFC 1321 – R Rivest - 1992
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
819 The MD5 message-digest algorithm – R Rivest - 1992
106 Message Authentication with One-Way Hash Functions – Gene Tsudik - 1992
230 Monte Carlo Methods for Index Computation (mod p – J M Pollard - 1978
110 Analysis and Design of Cryptographic Hash Functions – B Preneel - 1993
122 XOR MACS: New Methods for Message Authentication using Finite Pseudorandom Functions – Mihir Bellare, Roch Guérin, Phillip Rogaway - 1995
830 How To Prove Yourself: Practical Solutions to Identification and Signature Problems – Amos Fiat, Adi Shamir - 1987
2895 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
72 Theorems of factorization and primality testing – J Pollard - 1974
33 On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER – Serge Vaudenay, Serge Vaudenay - 1994