Multicollision Attacks on a Class of Hash Functions (2005)

Cached

Download Links

by M. Nandi , D. R. Stinson
Venue: IACR PREPRINT ARCHIVE
Citations:6 - 0 self

Documents Related by Co-Citation

71 Hash functions based on block ciphers: A synthetic approach – Bart Preneel, René Govaerts, Joos Vandewalle - 1993
175 One way hash functions and DES – R Merkle - 1990
167 Finding collisions in the full SHA-1 – Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu - 2005
51 Efficient collision search attacks on SHA-0 – Xiaoyun Wang, Hongbo Yu, Yiqun Lisa Yin - 2005
103 Black-box analysis of the block-cipher-based hash-function constructions from pgv – John Black, Phillip Rogaway, Thomas Shrimpton - 2002
214 How to break MD5 and other hash functions – Xiaoyun Wang, Hongbo Yu - 2005
6 Breaking the ICE — Finding Multicollisions – Jonathan Hoch, Adi Shamir - 2006
289 A Design Principle for Hash Functions – Ivan Damg˚ard - 1990
110 Analysis and Design of Cryptographic Hash Functions – B Preneel - 1993
8 A Simple and Provably Good Code for SHA Message Expansion – Charanjit S. Jutla, Anindya C. Patthak - 2005
29 Design principles for iterated hash functions – Stefan Lucks - 2004
42 A failure-friendly design principle for hash functions – Stefan Lucks - 2005
38 Preimages on n-Bit Hash Functions for Much Less than 2 n Work – Second - 2005
5 Multicollision attacks on some generalized sequential hash functions. Cryptology ePrint Archive, Report 2006/055 – D. R. Stinson - 2006
2 Avr 8-bit RISC. http://www.atmel.com/dyn/products/tools – Atmel
2 card product selection guide – Smart - 2005
2 Breaking the ICE—finding multicollisions in iterated concatenated and expanded (ICE) hash functions – Jonathan J Hoch, Adi Shamir
2 Indistinguishability and Composition of Random Systems – Krzysztof Pietrzak - 2006
2 Hash functions – present state of art, 2005. ECrypt Conference on Hash Functions – Bart Preneel