New second preimage attacks on dithered hash functions with low memory complexity
From MaRDI portal
Publication:1698640
Recommendations
Cites work
- scientific article; zbMATH DE number 4195165 (Why is no real title available?)
- scientific article; zbMATH DE number 3303655 (Why is no real title available?)
- Abelian squares are avoidable on 4 letters
- Advances in Cryptology – CRYPTO 2004
- Advances in cryptology - CRYPTO '89. Proceedings of a conference held at the University of California, Santa Barbara, CA (USA), August 20-24, 1989
- Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
- Cycle detection using a stack
- Herding Hash Functions and the Nostradamus Attack
- Herding, second preimage and Trojan message attacks beyond Merkle-Damgård
- New second-preimage attacks on hash functions
- On the Indifferentiability of the Sponge Construction
- One Way Hash Functions and DES
- Parallel collision search with cryptanalytic applications
- Second Preimage Attacks on Dithered Hash Functions
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
Cited in
(5)- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- A second pre-image attack and a collision attack to cryptographic hash function lux
- New Second Preimage Attack Variants against the MD-Structure
- Second Preimage Attacks on Dithered Hash Functions
- New second-preimage attacks on hash functions
This page was built for publication: New second preimage attacks on dithered hash functions with low memory complexity
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1698640)