Cryptanalysis of MDC-2
From MaRDI portal
Publication:3627430
DOI10.1007/978-3-642-01001-9_6zbMath1239.94056OpenAlexW1590298294WikidataQ56933225 ScholiaQ56933225MaRDI QIDQ3627430
Søren S. Thomsen, Florian Mendel, Christian Rechberger, Lars R. Knudsen
Publication date: 12 May 2009
Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_6
Related Items (8)
Open problems in hash function security ⋮ MJH: a faster alternative to MDC-2 ⋮ Quantum algorithm for the multicollision problem ⋮ On the collision and preimage security of MDC-4 in the ideal cipher model ⋮ MJH: A Faster Alternative to MDC-2 ⋮ Cryptanalysis of Vortex ⋮ Two Passes of Tiger Are Not One-Way ⋮ Beyond conventional security in sponge-based authenticated encryption modes
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Attacks on fast double block length hash functions
- MD4 is Not One-Way
- Preimages for Reduced SHA-0 and SHA-1
- Some Plausible Constructions of Double-Block-Length Hash Functions
- A cryptanalytic time-memory trade-off
- An improved Monte Carlo factorization algorithm
- Encyclopedia of Cryptography and Security
- Advances in Cryptology – CRYPTO 2004
- Weaknesses in the HAS-V Compression Function
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- The Collision Intractability of MDC-2 in the Ideal-Cipher Model
- Towards Optimal Double-Length Hash Functions
- A Failure-Friendly Design Principle for Hash Functions
- Fast Software Encryption
- Nondeterministic Algorithms
This page was built for publication: Cryptanalysis of MDC-2