Bad Directions in Cryptographic Hash Functions
From MaRDI portal
Publication:3194624
DOI10.1007/978-3-319-19962-7_28zbMath1391.94729MaRDI QIDQ3194624
Andreas Hülsing, Ruben Niederhagen, Tanja Lange, Daniel J. Bernstein
Publication date: 20 October 2015
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://research.tue.nl/nl/publications/bad-directions-in-cryptographic-hash-functions(1ab0ae0c-39a0-4726-a6a8-62a83e2d2a6b).html
matrix multiplication; hash functions; symmetric cryptography; meet-in-the-middle attacks; password hashing; point obfuscation; meet-in-many-middles attacks
94A60: Cryptography
Related Items
The random oracle model: a twenty-year retrospective, Bad Directions in Cryptographic Hash Functions
Cites Work
- Unnamed Item
- Unnamed Item
- On best-possible obfuscation
- Kangaroos, monopoly and discrete logarithms
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Practical Multilinear Maps over the Integers
- Cryptanalysis of the Multilinear Map over the Integers
- Biclique Cryptanalysis of the Full AES
- Bad Directions in Cryptographic Hash Functions
- VSH, an Efficient and Provable Collision-Resistant Hash Function
- Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family
- Candidate Multilinear Maps from Ideal Lattices
- Advances in Cryptology - EUROCRYPT 2004