A failure-friendly design principle for hash functions (2005)

by Stefan Lucks
Citations:42 - 5 self

Documents Related by Co-Citation

289 A design principle for hash functions – I Damg˚ard - 1990
93 Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions – A Joux - 2004
38 Preimages on n-Bit Hash Functions for Much Less than 2 n Work – Second - 2005
175 One way hash functions and DES – R Merkle - 1990
59 Multi-Property-Preserving Hash Domain Extension and the EMD Transform – Mihir Bellare, Thomas Ristenpart - 2006
74 Merkle-Damg˚ard Revisited: How to Construct a Hash Function – Jean-sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya
35 Some Plausible Constructions of Double-Block-Length Hash Functions – Shoichi Hirose - 2006
103 Black-box analysis of the block-cipher-based hash-function constructions from pgv – John Black, Phillip Rogaway, Thomas Shrimpton - 2002
71 Hash functions based on block ciphers: A synthetic approach – B Preneel, R Govaerts, J Vandewalle - 1994
71 Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology – Ueli Maurer, Renato Renner, Clemens Holenstein - 2004
2445 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
53 Hash Functions Based on Block Ciphers – Xuejia Lai, James L. Massey - 1993
38 Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya, Merkle-Damg˚ard Revisited: How to Construct a Hash Function – Jean-Sébastien Coron - 2005
1329 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
21 Attacks on fast double block length hash functions – L R Knudsen, X J Lai, B Preneel - 1998
167 Finding collisions in the full SHA-1 – Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu - 2005
213 How to break MD5 and other hash functions – Xiaoyun Wang, Hongbo Yu - 2005
48 Assche, On the Indifferentiability of the Sponge Construction – Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van - 2008
474 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996