Some Attacks Against a Double Length Hash Proposal
From MaRDI portal
Publication:5451085
DOI10.1007/11593447_25zbMATH Open1154.94406OpenAlexW1551878608MaRDI QIDQ5451085FDOQ5451085
Authors: Frédéric Muller, Lars R. Knudsen
Publication date: 18 March 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11593447_25
Recommendations
Cited In (10)
- The preimage security of double-block-length compression functions
- Towards Optimal Double-Length Hash Functions
- Title not available (Why is that?)
- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function
- Fast Software Encryption
- Attacks on a double length blockcipher-based hash proposal
- On the collision and preimage resistance of certain two-call hash functions
- Attacks on fast double block length hash functions
This page was built for publication: Some Attacks Against a Double Length Hash Proposal
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451085)