Advances in Cryptology – CRYPTO 2004
From MaRDI portal
Publication:5311539
DOI10.1007/b99099zbMath1104.94307OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311539
Publication date: 23 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b99099
Related Items (29)
Collision attack on the full extended MD4 and pseudo-preimage attack on RIPEMD ⋮ Using Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-Functions ⋮ Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 ⋮ Time-Memory Trade-Offs for Near-Collisions ⋮ The parallel-cut meet-in-the-middle attack ⋮ Attacking Reduced Round SHA-256 ⋮ Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography ⋮ Enhancing differential-neural cryptanalysis ⋮ Practical-time related-key attack on GOST with secret S-boxes ⋮ Classification and generation of disturbance vectors for collision attacks against SHA-1 ⋮ Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL ⋮ New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba ⋮ Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL ⋮ A provably secure short signature scheme based on discrete logarithms ⋮ Linear Analysis of Reduced-Round CubeHash ⋮ Herding Hash Functions and the Nostradamus Attack ⋮ Cryptanalysis of SHA-0 and reduced SHA-1 ⋮ Collisions for 70-Step SHA-1: On the Full Cost of Collision Search ⋮ Extended Multi-Property-Preserving and ECM-Construction ⋮ An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations ⋮ Rotational rebound attacks on reduced Skein ⋮ Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC ⋮ Optimal Covering Codes for Finding Near-Collisions ⋮ Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL ⋮ Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance ⋮ Practical Attack on 8 Rounds of the Lightweight Block Cipher KLEIN ⋮ Practical Analysis of Reduced-Round Keccak ⋮ Efficient Hash Collision Search Strategies on Special-Purpose Hardware ⋮ Security of meta-He digital signature scheme based on factoring and discrete logarithms
This page was built for publication: Advances in Cryptology – CRYPTO 2004