On the Weak Ideal Compression Functions (Q3634496): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-02620-1_16 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1567581889 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology - CRYPTO '89. Proceedings of a conference held at the University of California, Santa Barbara, CA (USA), August 20-24, 1989 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Merkle-Damgård Revisited: How to Construct a Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22--26, 2005. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3212279 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of Encryption Schemes in Weakened Random Oracle Models / rank
 
Normal rank
Property / cites work
 
Property / cites work: Herding Hash Functions and the Nostradamus Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing an Ideal Hash Function from Weak Ideal Compression Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of Digital Signature Schemes in Weakened Random Oracle Models / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14--18, 2005. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Collisions in the Full SHA-1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Break MD5 and Other Hash Functions / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 16:41, 1 July 2024

scientific article
Language Label Description Also known as
English
On the Weak Ideal Compression Functions
scientific article

    Statements

    On the Weak Ideal Compression Functions (English)
    0 references
    0 references
    0 references
    25 June 2009
    0 references
    random oracle
    0 references
    weak ideal compression function
    0 references
    indifferentiability
    0 references
    hash construction
    0 references

    Identifiers