scientific article; zbMATH DE number 503258

From MaRDI portal
Publication:4279583

zbMath0800.68418MaRDI QIDQ4279583

Ronald L. Rivest

Publication date: 20 September 1994


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (40)

Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVALBlockcipher-Based Double-Length Hash Functions for Pseudorandom OraclesArbitrated unconditionally secure authentication scheme with multi-sendersFast Hashing on the PentiumCollision attack on the full extended MD4 and pseudo-preimage attack on RIPEMDCryptanalysis of full \texttt{RIPEMD-128}A structure-based chaotic hashing schemeOn-line/off-line digital signaturesAn analysis of the blockcipher-based hash functions from PGVSecurity analysis of randomize-hash-then-sign digital signaturesOpen problems in hash function securityPassword Recovery on Challenge and Response: Impossible Differential Attack on Hash FunctionA Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic MapMD4 is Not One-WayNew Techniques for Cryptanalysis of Hash Functions and Improved Attacks on SnefruA fast software one-way hash functionMulti-collision Attack on the Compression Functions of MD4 and 3-Pass HAVALA fast new DES implementation in softwareFast Hashing and Stream Encryption with PanamaNew Constructions for Secure Hash FunctionsOn the Design and Security of RC2The First Two Rounds of MD4 are Not One-WayRIPEMD with two-round compress function is not collision-freeThe NIST SHA-3 Competition: A Perspective on the Final YearSimple hash function using discrete-time quantum walksCryptanalysis of MD2Collision Resistant Double-Length HashingQuantum algorithm to find invariant linear structure of \(MD\) hash functionsCryptanalysis of SHA-0 and reduced SHA-1Analysis and improvement of a chaos-based hash function constructionHow to Fill Up Merkle-Damgård Hash FunctionsThe Delicate Issues of Addition with Respect to XOR DifferencesNew Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5A Data Concealing Technique with Random Noise Disturbance and a Restoring Technique for the Concealed Data by Stochastic Process EstimationMerging Variables: One Technique of Search in Pseudo-Boolean OptimizationOn Randomizing Hash Functions to Strengthen the Security of Digital SignaturesMeet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and OthersSecond Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVALHash function based on quantum walksA quantum hash function with grouped coarse-grained boson sampling




This page was built for publication: