Advances in Cryptology – CRYPTO 2004

From MaRDI portal
Publication:5311540

DOI10.1007/b99099zbMath1104.68043OpenAlexW2477011922WikidataQ27980744 ScholiaQ27980744MaRDI QIDQ5311540

Antoine Joux

Publication date: 23 August 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b99099




Related Items (51)

Provable Chosen-Target-Forced-Midfix Preimage ResistanceImproved indifferentiability security bound for the JH modeUnintended features of APIs: cryptanalysis of incremental HMACIndifferentiability security of the fast wide pipe hash: breaking the birthday barrierCryptanalysis of the Round-Reduced GOST Hash FunctionSecure data storage in cloud: an e-stream cipher-based secure and dynamic updation policyNew second-preimage attacks on hash functionsERINDALE: A Polynomial Based Hashing AlgorithmThe design of keyed hash function based on CNN-MD structureUnavoidable regularities in long words with bounded number of symbol occurrencesCryptanalysis of GrindahlKeyed Streebog is a secure PRF and MACCryptanalysis of GOST R hash functionGeneric attacks on hash combinersImproved generic attacks against hash-based MACs and HAIFAOn time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashingCollision-resistance from multi-collision-resistanceHow (Not) to Efficiently Dither Blockcipher-Based Hash Functions?On time-space tradeoffs for bounded-length collisions in Merkle-Damgård hashingCollision attack on \({\mathtt Grindahl}\)Preimage Attacks on Step-Reduced MD5On the complexity of the herding attack and some related attacks on hash functionsBreaking category five \(\mathrm{SPHINCS}^+\) with SHA-256New second preimage attacks on dithered hash functions with low memory complexityOn the Strength of the Concatenated Hash Combiner When All the Hash Functions Are WeakA (Second) Preimage Attack on the GOST Hash FunctionA new black box analysis of hash functions based on block ciphersCollisions for RC4-HashMulti-collision Attack on the Compression Functions of MD4 and 3-Pass HAVALLinear Analysis of Reduced-Round CubeHashFast correlation attack on stream cipher ABC v3Efficient dissection of bicomposite problems with cryptanalytic applicationsCryptanalysis of MD2Herding Hash Functions and the Nostradamus AttackCryptanalysis of the GOST Hash FunctionConstructing Cryptographic Hash Functions from Fixed-Key BlockciphersSlide Attacks on a Class of Hash FunctionsHow to Fill Up Merkle-Damgård Hash FunctionsBuilding indifferentiable compression functions from the PGV compression functionsНекоторые методы анализа функций хэширования и их применение к алгоритму ГОСТ Р 34.11-94Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic AttacksCryptanalysis of MDC-2A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday BarrierThe Latin squares and the secret sharing schemesInside the HypercubeMeet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and OthersOn the Weak Ideal Compression FunctionsStructural Attacks on Two SHA-3 Candidates: Blender-n and DCH-nIncreasing the flexibility of the herding attackHash Functions and RFID Tags: Mind the GapFaster Multicollisions




This page was built for publication: Advances in Cryptology – CRYPTO 2004