One Way Hash Functions and DES
From MaRDI portal
Publication:6080285
DOI10.1007/0-387-34805-0_40MaRDI QIDQ6080285
Publication date: 2 October 2023
Published in: Advances in Cryptology — CRYPTO’ 89 Proceedings (Search for Journal in Brave)
Related Items
Subquadratic SNARGs in the random oracle model ⋮ A practical anonymous payment scheme for electronic commerce ⋮ Collapseability of Tree Hashes ⋮ Streebog compression function as PRF in secret-key settings ⋮ Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier ⋮ \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption ⋮ Cryptanalysis of full \texttt{RIPEMD-128} ⋮ A note on quantum collision resistance of double-block-length compression functions ⋮ A structure-based chaotic hashing scheme ⋮ On the ring-LWE and polynomial-LWE problems ⋮ Layering quantum-resistance into classical digital signature algorithms ⋮ A digital signature scheme $\mathrm{mCFS}^{\mathrm{QC{-}LDPC}}$ based on $\mathrm{QC}$-$\mathrm{LDPC}$ codes ⋮ A provably secure non-iterative hash function resisting birthday attack ⋮ Cryptanalysis of Reduced-Round Whirlwind ⋮ A New Non-Merkle-Damgård Structural Hash Function with Provable Security ⋮ An analysis of the blockcipher-based hash functions from PGV ⋮ Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 ⋮ Open problems in hash function security ⋮ Cryptanalysis of Grindahl ⋮ Related-key attacks on the compression function of Streebog ⋮ Keyed Streebog is a secure PRF and MAC ⋮ Generic attacks on hash combiners ⋮ Randomized half-ideal cipher on groups with applications to UC (a)PAKE ⋮ Block-cipher-based tree hashing ⋮ How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? ⋮ Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography ⋮ Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials ⋮ Double-block-length hash function for minimum memory size ⋮ Simplified MITM modeling for permutations: new (quantum) attacks ⋮ Zero-history confidential chains with zero-knowledge contracts: a new normal for decentralized ledgers? ⋮ New second preimage attacks on dithered hash functions with low memory complexity ⋮ Collision analysis of one kind of chaos-based hash function ⋮ Keyed hash function based on a chaotic map ⋮ A simple variant of the Merkle-Damgård scheme with a permutation ⋮ On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak ⋮ Improved collision detection of MD5 with additional sufficient conditions ⋮ New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru ⋮ Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication ⋮ How to Build a Hash Function from Any Collision-Resistant Function ⋮ Boosting Merkle-Damgård Hashing for Message Authentication ⋮ Concurrent signature without random oracles ⋮ New Constructions for Secure Hash Functions ⋮ Modeling Random Oracles Under Unpredictable Queries ⋮ MJH: a faster alternative to MDC-2 ⋮ Simple hash function using discrete-time quantum walks ⋮ Cryptanalysis of MD2 ⋮ Cryptanalysis of SHA-0 and reduced SHA-1 ⋮ Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers ⋮ On the collision and preimage security of MDC-4 in the ideal cipher model ⋮ Некоторые методы анализа функций хэширования и их применение к алгоритму ГОСТ Р 34.11-94 ⋮ Extended Multi-Property-Preserving and ECM-Construction ⋮ An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions ⋮ A New Mode of Operation for Block Ciphers and Length-Preserving MACs ⋮ Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks ⋮ On the impossibility of highly-efficient blockcipher-based hash functions ⋮ Domain extender for collision resistant hash functions: Improving upon Merkle-Damgård iteration ⋮ Increasing the flexibility of the herding attack ⋮ Specification governor for fault tolerant control of large-scale manufacturing systems ⋮ Hash function based on quantum walks ⋮ Hash Functions and RFID Tags: Mind the Gap ⋮ The rebound attack and subspace distinguishers: application to Whirlpool ⋮ Instantiation of quantum point obfuscation ⋮ A quantum hash function with grouped coarse-grained boson sampling ⋮ Collision-resistant and pseudorandom function based on Merkle-Damgård hash function ⋮ On the security of RFID anti-counting security protocol (ACSP)