scientific article; zbMATH DE number 503258
From MaRDI portal
Publication:4279583
zbMath0800.68418MaRDI QIDQ4279583
Publication date: 20 September 1994
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (40)
Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL ⋮ Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles ⋮ Arbitrated unconditionally secure authentication scheme with multi-senders ⋮ Fast Hashing on the Pentium ⋮ Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ Cryptanalysis of full \texttt{RIPEMD-128} ⋮ A structure-based chaotic hashing scheme ⋮ On-line/off-line digital signatures ⋮ An analysis of the blockcipher-based hash functions from PGV ⋮ Security analysis of randomize-hash-then-sign digital signatures ⋮ Open problems in hash function security ⋮ Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function ⋮ A Novel Approach for Constructing One-Way Hash Function Based on a Message Block Controlled 8D Hyperchaotic Map ⋮ MD4 is Not One-Way ⋮ New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru ⋮ A fast software one-way hash function ⋮ Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL ⋮ A fast new DES implementation in software ⋮ Fast Hashing and Stream Encryption with Panama ⋮ New Constructions for Secure Hash Functions ⋮ On the Design and Security of RC2 ⋮ The First Two Rounds of MD4 are Not One-Way ⋮ RIPEMD with two-round compress function is not collision-free ⋮ The NIST SHA-3 Competition: A Perspective on the Final Year ⋮ Simple hash function using discrete-time quantum walks ⋮ Cryptanalysis of MD2 ⋮ Collision Resistant Double-Length Hashing ⋮ Quantum algorithm to find invariant linear structure of \(MD\) hash functions ⋮ Cryptanalysis of SHA-0 and reduced SHA-1 ⋮ Analysis and improvement of a chaos-based hash function construction ⋮ How to Fill Up Merkle-Damgård Hash Functions ⋮ The Delicate Issues of Addition with Respect to XOR Differences ⋮ New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 ⋮ A Data Concealing Technique with Random Noise Disturbance and a Restoring Technique for the Concealed Data by Stochastic Process Estimation ⋮ Merging Variables: One Technique of Search in Pseudo-Boolean Optimization ⋮ On Randomizing Hash Functions to Strengthen the Security of Digital Signatures ⋮ Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others ⋮ Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL ⋮ Hash function based on quantum walks ⋮ A quantum hash function with grouped coarse-grained boson sampling
This page was built for publication: