On the complexity of the herding attack and some related attacks on hash functions
From MaRDI portal
(Redirected from Publication:420639)
Recommendations
Cites work
- scientific article; zbMATH DE number 3168330 (Why is no real title available?)
- scientific article; zbMATH DE number 2051154 (Why is no real title available?)
- scientific article; zbMATH DE number 822581 (Why is no real title available?)
- scientific article; zbMATH DE number 2221909 (Why is no real title available?)
- A composition theorem for universal one-way hash functions
- Advances in Cryptology – CRYPTO 2004
- Automatic Sequences
- Average-case analysis of algorithms for matchings and related problems
- Component evolution in a secure wireless sensor network
- Connectivity of the uniform random intersection graph
- Graph theory
- Hash function requirements for Schnorr signatures
- Herding Hash Functions and the Nostradamus Attack
- Herding, second preimage and Trojan message attacks beyond Merkle-Damgård
- Introduction to modern cryptography
- On the existence of a factor of degree one of a connected random graph
- Random graphs.
- Random intersection graphs whenm=?(n): An equivalence theorem relating the evolution of theG(n,m,p) andG(n,p) models
- Second Preimage Attacks on Dithered Hash Functions
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Sharp threshold functions for random intersection graphs via a coupling method
Cited in
(10)- Nostradamus goes quantum
- On Some Combinatorial Properties of Random Intersection Graphs
- Efficient construction of diamond structures
- Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier
- Quantum attacks on hash constructions with low quantum random access memory
- Increasing the flexibility of the herding attack
- Improving generic attacks using exceptional functions
- On diamond structures and Trojan message attacks
- Provable chosen-target-forced-midfix preimage resistance
- Generic attacks on hash combiners
This page was built for publication: On the complexity of the herding attack and some related attacks on hash functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q420639)