Multicollision Attacks on a Class of Hash Functions (2005)


Download Links

by M. Nandi , D. R. Stinson
Citations:6 - 0 self

Active Bibliography

6 On the Security of Tandem-DM – Ewan Fleischmann, Michael Gorski, Stefan Lucks
9 Security of Cyclic Double Block Length Hash Functions including Abreast-DM – Ewan Fleischmann, Michael Gorski, Stefan Lucks
42 A failure-friendly design principle for hash functions – Stefan Lucks - 2005
18 Constructing cryptographic hash functions from fixed-key blockciphers. Full version of this paper – Phillip Rogaway, John Steinberger - 2008
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
3 A critical look at cryptographic hash function literature – Scott Contini, Ron Steinfeld, Josef Pieprzyk, Krystian Matusiewicz - 2007
15 Building a collision-resistant compression function from non-compressing primitives – Thomas Shrimpton, Martijn Stam - 2008
Multicollision Attacks on Generalized Hash Functions – M. Nandi, D. R. Stinson - 2004
1 More Insights on Blockcipher-Based Hash Functions – Yiyuan Luo, Xuejia Lai
Attacks On a Double Length Blockcipher-based Hash Proposal – Yiyuan Luo, Xuejia Lai
On the Design of Secure and Fast Double Block Length Hash Functions – Zheng Gong, Xuejia Lai, Kefei Chen
unknown title – unknown authors - 2004
2 3C -- A Provably Secure Pseudorandom Function and Message Authentication Code. A New mode of operation for Cryptographic Hash Function – Praveen Gauravaram, William Millan, Juanma Gonzalez Neito, Edward Dawson - 2005
10 Towards Secure and Fast Hash Functions – Takashi Satoh, Mio Haga, Kaoru Kurosawa - 1999
Cryptographic Hash Functions: A Review – Rajeev Sobti, G. Geetha
�Dean/Kelsey/Schneier Attacks �Square-Free Sequences – Prouhet-Thue-Morse Sequences – Towers of Hanoi �Abelian Square-Free Sequences –Keränen’s Sequence �Dithering �Open Questions �Conclusions Typical Iterated hashing – Ronald L. Rivest, M Ml
2 Cryptanalysis of the Yi-Lam hash – David Wagner
The Symbiosis between Collision and Preimage Resistance ∗ – Elena Andreeva, Martijn Stam
2 Constructing Secure Hash Functions from Weak Compression Functions: The Case for Non-Streamable Hash Functions – Moses Liskov - 2006