Generic attacks on hash combiners (Q2188959): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / OpenAlex ID
 
Property / OpenAlex ID: W2958581977 / rank
 
Normal rank
Property / cites work
 
Property / cites work: New second-preimage attacks on hash functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård / rank
 
Normal rank
Property / cites work
 
Property / cites work: Second Preimage Attacks on Dithered Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Impossibility of Efficiently Combining Collision Resistant Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the complexity of the herding attack and some related attacks on hash functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Functional graph revisited: updates on (second) preimage attacks on hash combiners / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22--26, 2005. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Amplifying Collision Resistance: A Complexity-Theoretic Treatment / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Attacks on the Concatenation and XOR Hash Combiners / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved Generic Attacks against Hash-Based MACs and HAIFA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security-Amplifying Combiners for Collision-Resistant Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-property Preserving Combiners for Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust Multi-property Combiners for Hash Functions Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust multi-property combiners for hash functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3973158 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17--21, 2014. Proceedings, Part I / rank
 
Normal rank
Property / cites work
 
Property / cites work: Updates on Generic Attacks against HMAC and NMAC / rank
 
Normal rank
Property / cites work
 
Property / cites work: A cryptanalytic time-memory trade-off / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topics in Cryptology – CT-RSA 2005 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithmic Cryptanalysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: Herding Hash Functions and the Nostradamus Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing an Ideal Hash Function from Weak Ideal Compression Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: New Generic Attacks against Hash-Based MACs / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Sum Can Be Weaker Than Each Part / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptography in the Multi-string Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: One Way Hash Functions and DES / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output / rank
 
Normal rank
Property / cites work
 
Property / cites work: Breaking and Fixing Cryptophia’s Short Combiner / rank
 
Normal rank
Property / cites work
 
Property / cites work: MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multicollision Attacks on Some Generalized Sequential Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don’t Exist / rank
 
Normal rank
Property / cites work
 
Property / cites work: Compression from Collisions, or Why CRHF Combiners Have a Long Output / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generic Universal Forgery Attack on Iterative Hash-Based MACs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Parallel collision search with cryptanalytic applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4409125 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Break MD5 and Other Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Collisions in the Full SHA-1 / rank
 
Normal rank

Latest revision as of 22:51, 22 July 2024

scientific article
Language Label Description Also known as
English
Generic attacks on hash combiners
scientific article

    Statements

    Generic attacks on hash combiners (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    15 June 2020
    0 references
    0 references
    0 references
    0 references
    0 references
    hash function
    0 references
    generic attack
    0 references
    hash combiner
    0 references
    XOR combiner
    0 references
    concatenation combiner
    0 references
    Zipper hash
    0 references
    Hash-Twice
    0 references
    (second) preimage attack
    0 references
    0 references
    0 references
    0 references