Open problems in hash function security (Q887443): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / OpenAlex ID
 
Property / OpenAlex ID: W1203305141 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Reductions of the Second Round SHA-3 Candidates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein / rank
 
Normal rank
Property / cites work
 
Property / cites work: Seven-Property-Preserving Iterated Hashing: ROX / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Three-Property-Secure Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Symbiosis between Collision and Preimage Resistance / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Preimage Security of Double-Block-Length Compression Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reset Indifferentiability and Its Consequences / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4542560 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364571 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Indifferentiability of the Sponge Construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sakura: A Flexible Coding for Tree Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Analysis of the Mode of JH Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distinguisher and Related-Key Attack on the Full AES-256 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409127 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An analysis of the blockcipher-based hash functions from PGV / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Hashing Using the AES Instruction Set / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Minimizing the Two-Round Even-Mansour Cipher / rank
 
Normal rank
Property / cites work
 
Property / cites work: Merkle-Damgård Revisited: How to Construct a Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2760977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3212279 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Resource-Restricted Indifferentiability / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: RIPEMD-160: A strengthened version of RIPEMD / rank
 
Normal rank
Property / cites work
 
Property / cites work: A New Mode of Operation for Block Ciphers and Length-Preserving MACs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Salvaging Merkle-Damgård for Practical Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security of Cyclic Double Block Length Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Building indifferentiable compression functions from the PGV compression functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security analysis of randomize-hash-then-sign digital signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: A synthetic indifferentiability analysis of some block-cipher-based hash functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Strengthening Digital Signatures Via Randomized Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413872 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provably Secure Double-Block-Length Hash Functions in a Black-Box Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Some Plausible Constructions of Double-Block-Length Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collisions Are Not Incidental: A Compression Function Exploiting Discrete Geometry / rank
 
Normal rank
Property / cites work
 
Property / cites work: Herding Hash Functions and the Nostradamus Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work / rank
 
Normal rank
Property / cites work
 
Property / cites work: Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364572 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Construction of secure and fast hash functions using nonbinary error-correcting codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Grindahl Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of MDC-2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279661 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Provable Security of the Knudsen-Preneel Compression Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collision Resistance of the JH Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: MJH: A Faster Alternative to MDC-2 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Collision Security of Tandem-DM in the Ideal Cipher Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - ASIACRYPT 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4718481 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal Collision Security in Double Block Length Hashing with Single Length Key / rank
 
Normal rank
Property / cites work
 
Property / cites work: Indifferentiability of Double Length Compression Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the collision and preimage security of MDC-4 in the ideal cipher model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hash Functions Based on Three Permutations: A Generic Security Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the XOR of Multiple Random Permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: One Way Hash Functions and DES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3342347 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4036887 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved indifferentiability security bound for the JH mode / rank
 
Normal rank
Property / cites work
 
Property / cites work: Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Another Glance at Double-Length Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collision Attacks against the Knudsen-Preneel Compression Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Attacking the Knudsen-Preneel Compression Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of iterated message authentication codes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341676 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341762 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships / rank
 
Normal rank
Property / cites work
 
Property / cites work: Careful with Composition: Limitations of the Indifferentiability Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279583 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security/Efficiency Tradeoffs for Permutation-Based Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Construction of universal one-way hash functions: tree hashing revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Building a Collision-Resistant Compression Function from Non-compressing Primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249649 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Blockcipher-Based Hashing Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Collision Intractability of MDC-2 in the Ideal-Cipher Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stam’s Collision Resistance Conjecture / rank
 
Normal rank
Property / cites work
 
Property / cites work: Stam’s Conjecture and Threshold Phenomena in Collision Resistance / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Break MD5 and Other Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Collisions in the Full SHA-1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Fill Up Merkle-Damgård Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341675 / rank
 
Normal rank

Latest revision as of 23:37, 10 July 2024

scientific article
Language Label Description Also known as
English
Open problems in hash function security
scientific article

    Statements

    Open problems in hash function security (English)
    0 references
    0 references
    0 references
    0 references
    26 October 2015
    0 references
    0 references
    cryptographic hash function
    0 references
    compression functions
    0 references
    reductions
    0 references
    permutation based
    0 references
    block cipher based
    0 references
    open problems
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references