Herding Hash Functions and the Nostradamus Attack

From MaRDI portal
Publication:3593096

DOI10.1007/11761679_12zbMath1140.94354OpenAlexW1567888865WikidataQ57006297 ScholiaQ57006297MaRDI QIDQ3593096

John Kelsey, Tadayoshi Kohno

Publication date: 24 September 2007

Published in: Advances in Cryptology - EUROCRYPT 2006 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11761679_12




Related Items (33)

Provable Chosen-Target-Forced-Midfix Preimage ResistanceImproved indifferentiability security bound for the JH modeIndifferentiability security of the fast wide pipe hash: breaking the birthday barrierQuark: a lightweight hashNew second-preimage attacks on hash functionsOpen problems in hash function securityCryptanalysis of GrindahlGeneric attacks on hash combinersImproved generic attacks against hash-based MACs and HAIFADoes Secure Time-Stamping Imply Collision-Free Hash Functions?How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?Nostradamus goes quantumCollision attack on \({\mathtt Grindahl}\)On the complexity of the herding attack and some related attacks on hash functionsBreaking category five \(\mathrm{SPHINCS}^+\) with SHA-256New second preimage attacks on dithered hash functions with low memory complexityOn the Strength of the Concatenated Hash Combiner When All the Hash Functions Are WeakA new black box analysis of hash functions based on block ciphersLinear Analysis of Reduced-Round CubeHashFast correlation attack on stream cipher ABC v3Slide Attacks on a Class of Hash FunctionsHow to Fill Up Merkle-Damgård Hash FunctionsMulticollision attacks and generalized iterated hash functionsНекоторые методы анализа функций хэширования и их применение к алгоритму ГОСТ Р 34.11-94Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic AttacksOn chosen target forced prefix preimage resistanceIdentification protocols and signature schemes based on supersingular isogeny problemsHash function requirements for Schnorr signaturesOn the Weak Ideal Compression FunctionsMemory-Efficient Algorithms for Finding Needles in HaystacksIncreasing the flexibility of the herding attackFaster MulticollisionsSecure hash algorithm-2 formed on DNA



Cites Work


This page was built for publication: Herding Hash Functions and the Nostradamus Attack