Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n (Q3399201): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Finding Collisions in the Full SHA-1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Break MD5 and Other Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3212279 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Indifferentiability of the Sponge Construction / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Failure-Friendly Design Principle for Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptanalysis of the GOST Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology – CRYPTO 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341762 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysis of the Hash Function Design Strategy Called SMASH / rank
 
Normal rank
Property / cites work
 
Property / cites work: Second Preimage Attacks on Dithered Hash Functions / rank
 
Normal rank

Latest revision as of 23:45, 1 July 2024

scientific article
Language Label Description Also known as
English
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
scientific article

    Statements

    Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n (English)
    0 references
    0 references
    0 references
    29 September 2009
    0 references
    Hash functions
    0 references
    collision attacks
    0 references
    preimage attacks
    0 references
    SHA-3
    0 references
    Blender
    0 references
    DCH
    0 references

    Identifiers