Slide Attacks on a Class of Hash Functions (Q3600370): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_10 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1608254955 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Keying Hash Functions for Message Authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Indifferentiability of the Sponge Construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: New types of cryptanalytic attacks using related keys / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Slide Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26--28, 2007. Revised selected papers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941816 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374941 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology - CRYPTO '89. Proceedings of a conference held at the University of California, Santa Barbara, CA (USA), August 20-24, 1989 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Merkle-Damgård Revisited: How to Construct a Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3212279 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536653 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4417390 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Herding Hash Functions and the Nostradamus Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Hash Functions with Structures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341684 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Grindahl Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Failure-Friendly Design Principle for Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of Grindahl / rank
 
Normal rank
Property / cites work
 
Property / cites work: Progress in Cryptology – Mycrypt 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413320 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Security of Two MAC Algorithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function / rank
 
Normal rank

Latest revision as of 00:59, 29 June 2024

scientific article
Language Label Description Also known as
English
Slide Attacks on a Class of Hash Functions
scientific article

    Statements

    Slide Attacks on a Class of Hash Functions (English)
    0 references
    0 references
    0 references
    0 references
    10 February 2009
    0 references
    slide attacks
    0 references
    hash function
    0 references
    Grindahl
    0 references
    RadioGatún
    0 references
    MAC
    0 references
    sponge function
    0 references

    Identifiers