Some Attacks Against a Double Length Hash Proposal
From MaRDI portal
Publication:5451085
Recommendations
Cited in
(13)- A collision attack on a double-block-length compression function instantiated with round-reduced AES-256
- Attacks on a double length blockcipher-based hash proposal
- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions
- scientific article; zbMATH DE number 1088934 (Why is no real title available?)
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Towards Optimal Double-Length Hash Functions
- Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function
- On the collision and preimage resistance of certain two-call hash functions
- Attacks on fast double block length hash functions
- Fast Software Encryption
- Time-space tradeoffs and short collisions in Merkle-Damgård hash functions
- Cryptanalysis of the FSR-255 hash function
- The preimage security of double-block-length compression functions
This page was built for publication: Some Attacks Against a Double Length Hash Proposal
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451085)