The following pages link to (Q3212279):
Displayed 50 items.
- Provable Chosen-Target-Forced-Midfix Preimage Resistance (Q2889862) (← links)
- Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles (Q2889880) (← links)
- Really Fast Syndrome-Based Hashing (Q3011909) (← links)
- The NIST SHA-3 Competition: A Perspective on the Final Year (Q3011930) (← links)
- On the Security of Hash Functions Employing Blockcipher Postprocessing (Q3013082) (← links)
- Practical Near-Collisions on the Compression Function of BMW (Q3013087) (← links)
- MJH: A Faster Alternative to MDC-2 (Q3073709) (← links)
- The Latin squares and the secret sharing schemes (Q3085992) (← links)
- The Symbiosis between Collision and Preimage Resistance (Q3104691) (← links)
- Boomerang Distinguisher for the SIMD-512 Compression Function (Q3104738) (← links)
- Interactive Oracle Proofs (Q3181021) (← links)
- Cryptanalysis of Reduced-Round Whirlwind (Q3194587) (← links)
- A New Non-Merkle-Damgård Structural Hash Function with Provable Security (Q3196424) (← links)
- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n (Q3399201) (← links)
- On Free-Start Collisions and Collisions for TIB3 (Q3399203) (← links)
- Cryptanalysis of Grindahl (Q3498399) (← links)
- Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography (Q3506407) (← links)
- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak (Q3519537) (← links)
- New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru (Q3525694) (← links)
- Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication (Q3540155) (← links)
- VSH, an Efficient and Provable Collision-Resistant Hash Function (Q3593095) (← links)
- Herding Hash Functions and the Nostradamus Attack (Q3593096) (← links)
- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions (Q3600231) (← links)
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers (Q3600233) (← links)
- Hash Functions from Sigma Protocols and Improvements to VSH (Q3600369) (← links)
- Slide Attacks on a Class of Hash Functions (Q3600370) (← links)
- Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography (Q3600371) (← links)
- How to Fill Up Merkle-Damgård Hash Functions (Q3600380) (← links)
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures (Q3627429) (← links)
- A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier (Q3627438) (← links)
- Salvaging Merkle-Damgård for Practical Applications (Q3627446) (← links)
- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders (Q3634491) (← links)
- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security (Q3634492) (← links)
- On the Weak Ideal Compression Functions (Q3634496) (← links)
- A Three-Property-Secure Hash Function (Q3644203) (← links)
- How traveling salespersons prove their identity (Q4608506) (← links)
- New Constructions for Secure Hash Functions (Q4639447) (← links)
- Modeling Random Oracles Under Unpredictable Queries (Q4639493) (← links)
- Collision Resistant Double-Length Hashing (Q4933214) (← links)
- Interpreting Hash Function Security Proofs (Q4933215) (← links)
- Некоторые методы анализа функций хэширования и их применение к алгоритму ГОСТ Р 34.11-94 (Q4959056) (← links)
- A Data Concealing Technique with Random Noise Disturbance and a Restoring Technique for the Concealed Data by Stochastic Process Estimation (Q4964359) (← links)
- Streebog compression function as PRF in secret-key settings (Q5042273) (← links)
- A digital signature scheme $\mathrm{mCFS}^{\mathrm{QC{-}LDPC}}$ based on $\mathrm{QC}$-$\mathrm{LDPC}$ codes (Q5071487) (← links)
- (Q5109519) (← links)
- Design and Analysis on a Parallel Chaos-Based Hash Function (Q5138299) (← links)
- StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 (Q5152391) (← links)
- Cryptanalysis of a Hash Function Proposed at ICISC 2006 (Q5385512) (← links)
- How to Build a Hash Function from Any Collision-Resistant Function (Q5387097) (← links)
- Boosting Merkle-Damgård Hashing for Message Authentication (Q5387101) (← links)