Generic attacks on hash combiners
From MaRDI portal
Recommendations
- New attacks on the concatenation and XOR hash combiners
- Functional graph revisited: updates on (second) preimage attacks on hash combiners
- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak
- The sum can be weaker than each part
- MD5 is weaker than weak: attacks on concatenated combiners
Cites work
- scientific article; zbMATH DE number 16479 (Why is no real title available?)
- scientific article; zbMATH DE number 1942427 (Why is no real title available?)
- A cryptanalytic time-memory trade-off
- Advances in Cryptology – CRYPTO 2004
- Advances in cryptology -- CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17--21, 2014. Proceedings, Part I
- Advances in cryptology -- EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22--26, 2005. Proceedings
- Algorithmic Cryptanalysis
- Amplifying Collision Resistance: A Complexity-Theoretic Treatment
- Breaking and Fixing Cryptophia’s Short Combiner
- Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
- Collision spectrum, entropy loss, T-sponges, and cryptanalysis of GLUON-64
- Compression from Collisions, or Why CRHF Combiners Have a Long Output
- Constructing an Ideal Hash Function from Weak Ideal Compression Functions
- Cryptography in the Multi-string Model
- Finding Collisions in the Full SHA-1
- Functional graph revisited: updates on (second) preimage attacks on hash combiners
- Generic universal forgery attack on iterative hash-based MACs
- Hash combiners for second pre-image resistance, target collision resistance and pre-image resistance have long output
- Herding Hash Functions and the Nostradamus Attack
- Herding, second preimage and Trojan message attacks beyond Merkle-Damgård
- How to Break MD5 and Other Hash Functions
- Improved generic attacks against hash-based MACs and HAIFA
- MD5 is weaker than weak: attacks on concatenated combiners
- Multi-property Preserving Combiners for Hash Functions
- Multicollision Attacks on Some Generalized Sequential Hash Functions
- New attacks on the concatenation and XOR hash combiners
- New generic attacks against hash-based MACs
- New second-preimage attacks on hash functions
- Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don’t Exist
- On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak
- On the complexity of the herding attack and some related attacks on hash functions
- One Way Hash Functions and DES
- Parallel collision search with cryptanalytic applications
- Robust Multi-property Combiners for Hash Functions Revisited
- Robust multi-property combiners for hash functions
- Second Preimage Attacks on Dithered Hash Functions
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Security-Amplifying Combiners for Collision-Resistant Hash Functions
- The sum can be weaker than each part
- Topics in Cryptology – CT-RSA 2005
- Updates on generic attacks against HMAC and NMAC
Cited in
(14)- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak
- Random oracle combiners: breaking the concatenation barrier for collision-resistance
- Quantum attacks on hash constructions with low quantum random access memory
- Multi-property Preserving Combiners for Hash Functions
- Combiners for backdoored random oracles
- On the Generic Insecurity of the Full Domain Hash
- Generic Related-Key Attacks for HMAC
- Functional graph revisited: updates on (second) preimage attacks on hash combiners
- Hash combiners for second pre-image resistance, target collision resistance and pre-image resistance have long output
- The sum can be weaker than each part
- New attacks on the concatenation and XOR hash combiners
- Improving generic attacks using exceptional functions
- Security-Amplifying Combiners for Collision-Resistant Hash Functions
- MD5 is weaker than weak: attacks on concatenated combiners
This page was built for publication: Generic attacks on hash combiners
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2188959)