Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
From MaRDI portal
Publication:3618652
DOI10.1007/11799313_12zbMATH Open1234.94047OpenAlexW1483487117MaRDI QIDQ3618652FDOQ3618652
Authors: Jonathan Hoch, Adi Shamir
Publication date: 2 April 2009
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11799313_12
Recommendations
- Multicollision attacks and generalized iterated hash functions
- Advances in Cryptology – CRYPTO 2004
- Variants of multicollision attacks on iterated hash functions
- Generalized iterated hash fuctions revisited: new complexity bounds for multicollision attacks
- On Quantifying the Resistance of Concrete Hash Functions to Generic Multicollision Attacks
- Multicollision Attacks on Some Generalized Sequential Hash Functions
- On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
- Multi-collision resistance: a paradigm for keyless hash functions
- scientific article; zbMATH DE number 1543036
Cited In (17)
- Cryptanalysis of the CRUSH Hash Function
- Combinatorics on words in information security: unavoidable regularities in the construction of multicollision attacks on iterated hash functions
- Improved indifferentiability security bound for the JH mode
- Advances in Cryptology – CRYPTO 2004
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks
- Higher order eTCR hash functions
- Cryptanalysis of Grindahl
- Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier
- Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
- Faster Multicollisions
- Seven-Property-Preserving Iterated Hashing: ROX
- Multicollision attacks and generalized iterated hash functions
- Generalized iterated hash fuctions revisited: new complexity bounds for multicollision attacks
- Collision spectrum, entropy loss, T-sponges, and cryptanalysis of GLUON-64
- New second preimage attacks on dithered hash functions with low memory complexity
- Generic attacks on hash combiners
- Unavoidable regularities in long words with bounded number of symbol occurrences
This page was built for publication: Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3618652)