Advances in Cryptology – CRYPTO 2004

From MaRDI portal
Publication:5311539

DOI10.1007/b99099zbMath1104.94307OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311539

Eli Biham, Rafi Chen

Publication date: 23 August 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b99099




Related Items (29)

Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMDUsing Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-FunctionsImproved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160Time-Memory Trade-Offs for Near-CollisionsThe parallel-cut meet-in-the-middle attackAttacking Reduced Round SHA-256Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric CryptographyEnhancing differential-neural cryptanalysisPractical-time related-key attack on GOST with secret S-boxesClassification and generation of disturbance vectors for collision attacks against SHA-1Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVALNew Features of Latin Dances: Analysis of Salsa, ChaCha, and RumbaMulti-collision Attack on the Compression Functions of MD4 and 3-Pass HAVALA provably secure short signature scheme based on discrete logarithmsLinear Analysis of Reduced-Round CubeHashHerding Hash Functions and the Nostradamus AttackCryptanalysis of SHA-0 and reduced SHA-1Collisions for 70-Step SHA-1: On the Full Cost of Collision SearchExtended Multi-Property-Preserving and ECM-ConstructionAn Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE TransformationsRotational rebound attacks on reduced SkeinCryptanalysis on HMAC/NMAC-MD5 and MD5-MACOptimal Covering Codes for Finding Near-CollisionsSecond Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVALEfficient adaptively-secure IB-KEMs and VRFs via near-collision resistancePractical Attack on 8 Rounds of the Lightweight Block Cipher KLEINPractical Analysis of Reduced-Round KeccakEfficient Hash Collision Search Strategies on Special-Purpose HardwareSecurity of meta-He digital signature scheme based on factoring and discrete logarithms




This page was built for publication: Advances in Cryptology – CRYPTO 2004