Improved fast syndrome based cryptographic hash functions

by Daniel Augot , Matthieu Finiasz , Nicolas Sendrier
Venue:in Proceedings of ECRYPT Hash Workshop 2007 (2007). URL: http://www-roc.inria.fr/secret/Matthieu.Finiasz
Citations:24 - 5 self

Documents Related by Co-Citation

14 Cryptanalysis of a Provably Secure Cryptographic Hash Function – Jean-Sebastien Coron, Antoine Joux - 2004
93 A Generalized Birthday Problem – David Wagner - 2002
85 A new algorithm for finding minimum-weight words in a linear code: application to primitive narrow-sense BCH codes of length 511 – Florent Chabaud, Anne Canteaut, Anne Canteaut, Et Florent Chabaud, Projet Codes - 1998
61 How to achieve a McEliece-based digital signature scheme – Nicolas Courtois, Matthieu Finiasz, Nicolas Sendrier - 2001
9 A Fast Provably Secure Cryptographic Hash Function – Daniel Augot, Matthieu Finiasz, Nicolas Sendrier - 1996
197 A public-key cryptosystem based on algebraic coding theory – R J MCELIECE - 1978
51 An observation on the security of McEliece’s public key cryptosystem – P J LEE, E F BRICKELL - 1989
29 QUAD: a Practical Stream Cipher with Provable Security – Côme Berbain, Henri Gilbert, Jacques Patarin - 2006
223 Tilborg, On the inherent intractability of certain coding problems – E R Berlekamp, R J McEliece, H C A van - 1978
49 A method for finding codewords of small weight – J Stern - 1989
8 The extended k-tree algorithm – Lorenz Minder, Alistair Sinclair
10 Encoding information into constant weight words – N Sendrier - 2005
6 Cryptosystèmes à clé publique basés sur les codes correcteurs d'erreurs. Mémoire d'habilitation à diriger des recherches, Université Paris 6 – N Sendrier - 2002
10 an Efficient and Provable CollisionResistant Hash Function – VSH - 2006
3 Syndrome based collision resistant hashing – Matthieu Finiasz
47 A probabilistic algorithm for computing minimum weights of large error-correcting codes – J S Leon - 1988
26 The knapsack hash function proposed at Crypto’89 can be broken – P Camion, J Patarin - 1991
6 FSBday: Implementing Wagner’s generalized birthday attack against the SHA-3 ⋆ round-1 candidate FSB – Daniel J. Bernstein, Tanja Lange, Ruben Niederhagen, Christiane Peters, Peter Schwabe
4 HAVEGE: User-level Software Heuristic for Strong Random Numbers, in "ACM Transactions on Modeling and Computer Simulation – A SEZNEC, N SENDRIER - 2003