Domain Extender for Collision Resistant Hash Functions Using a Directed Acyclic Graph (2003)

by Palash Sarkar
Citations:2 - 0 self

Documents Related by Co-Citation

21 Attacks on fast double block length hash functions – L R Knudsen, X J Lai, B Preneel - 1998
10 Towards Secure and Fast Hash Functions – Takashi Satoh, Mio Haga, Kaoru Kurosawa - 1999
9 Construction of secure and fast hash functions using nonbinary error-correcting codes – L R Knudsen, B Preneel
29 Design principles for iterated hash functions – Stefan Lucks - 2004
2 A long-message attack on SHAx, MDx – J Kelsey
3 Analysis and Design of Cryptographic Hash – B Preneel - 1993
3 Damg ˙ard. A design principle for hash functions – I B - 1989
1 Dobbertin.Cryptanalysis of MD5 Rump Session of Eurocrypt 96 – H
6 Multicollisions in Iterated Hash Functions – A Joux - 2004
26 RIPEMD-160, a strengthened version – H Dobbertin, A Bosselaers, B Preneel - 1996
48 One way hash functions and – R C Merkle - 1989
368 The MD5 Message Digest Algorithm – R Rivest - 1321
22 On the Length of Cryptographic Hash-Values used in Identification Schemes – M Girault, J Stern - 1994
23 Provably Secure Double-Block-Length Hash Functions in a BlackBox Model – Shoichi Hirose - 2004
8 Analysis of double block length hash functions – M Hattori, S Hirose, S Yoshida
25 Design Validations for Discrete Logarithm Based Signature Schemes – Ernest Brickell, David Pointcheval, Serge Vaudenay, Moti Yung - 2000
175 One way hash functions and DES – R Merkle - 1990
27 Hash function balance and its impact on birthday attacks – Mihir Bellare, Tadayoshi Kohno - 2004
28 Some Observations on the Theory of Cryptographic Hash Functions – D.R. Stinson - 2001