Recommendations
Cites work
- scientific article; zbMATH DE number 4195165 (Why is no real title available?)
- scientific article; zbMATH DE number 503327 (Why is no real title available?)
- scientific article; zbMATH DE number 1024070 (Why is no real title available?)
- scientific article; zbMATH DE number 1942429 (Why is no real title available?)
- Another glance at double-length hashing
- Attacks on fast double block length hash functions
- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions
- Blockcipher-Based Hashing Revisited
- Building a Collision-Resistant Compression Function from Non-compressing Primitives
- Collision Resistance of the JH Hash Function
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- Cryptanalysis of MDC-2
- Cryptography and Coding
- Efficient hashing using the AES instruction set
- Hash Functions and RFID Tags: Mind the Gap
- How to Build a Hash Function from Any Collision-Resistant Function
- MJH: a faster alternative to MDC-2
- Multi-property-preserving domain extension using polynomial-based modes of operation
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- On the Security of Tandem-DM
- One Way Hash Functions and DES
- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Security of cyclic double block length hash functions
- Security/Efficiency Tradeoffs for Permutation-Based Hashing
- Some Plausible Constructions of Double-Block-Length Hash Functions
- The Collision Intractability of MDC-2 in the Ideal-Cipher Model
- The collision security of Tandem-DM in the ideal cipher model
Cited in
(5)
This page was built for publication: MJH: a faster alternative to MDC-2
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q498970)