On the security of multivariate hash functions
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 1302852 (Why is no real title available?)
- scientific article; zbMATH DE number 1304190 (Why is no real title available?)
- scientific article; zbMATH DE number 1455090 (Why is no real title available?)
- Analysis of Multivariate Hash Functions
- Higher Order Derivatives and Differential Cryptanalysis
- Multivariates Polynomials for Hashing
- On Building Hash Functions from Multivariate Quadratic Equations
Cited in
(13)- Interpreting hash function security proofs
- Multivariates Polynomials for Hashing
- On Building Hash Functions from Multivariate Quadratic Equations
- Increasing the security of hash functions
- Distinguishing properties and applications of higher order derivatives of Boolean functions
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- Information Security and Privacy
- More secure version of a Cayley hash function
- Security Analysis of Multivariate Polynomials for Hashing
- Security analysis of Even-Mansour structure hash functions
- A new multivariate hash algorithm based on an improved Merkle-Damgård construction
- scientific article; zbMATH DE number 1759781 (Why is no real title available?)
- Analysis of Multivariate Hash Functions
This page was built for publication: On the security of multivariate hash functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q615226)