One Way Hash Functions and DES

From MaRDI portal
Publication:6080285

DOI10.1007/0-387-34805-0_40MaRDI QIDQ6080285

Ralph C. Merkle

Publication date: 2 October 2023

Published in: Advances in Cryptology — CRYPTO’ 89 Proceedings (Search for Journal in Brave)




Related Items

Subquadratic SNARGs in the random oracle modelA practical anonymous payment scheme for electronic commerceCollapseability of Tree HashesStreebog compression function as PRF in secret-key settingsIndifferentiability security of the fast wide pipe hash: breaking the birthday barrier\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryptionCryptanalysis of full \texttt{RIPEMD-128}A note on quantum collision resistance of double-block-length compression functionsA structure-based chaotic hashing schemeOn the ring-LWE and polynomial-LWE problemsLayering quantum-resistance into classical digital signature algorithmsA digital signature scheme $\mathrm{mCFS}^{\mathrm{QC{-}LDPC}}$ based on $\mathrm{QC}$-$\mathrm{LDPC}$ codesA provably secure non-iterative hash function resisting birthday attackCryptanalysis of Reduced-Round WhirlwindA New Non-Merkle-Damgård Structural Hash Function with Provable SecurityAn analysis of the blockcipher-based hash functions from PGVImproved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160Open problems in hash function securityCryptanalysis of GrindahlRelated-key attacks on the compression function of StreebogKeyed Streebog is a secure PRF and MACGeneric attacks on hash combinersRandomized half-ideal cipher on groups with applications to UC (a)PAKEBlock-cipher-based tree hashingHow (Not) to Efficiently Dither Blockcipher-Based Hash Functions?Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric CryptographyAutomatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentialsDouble-block-length hash function for minimum memory sizeSimplified MITM modeling for permutations: new (quantum) attacksZero-history confidential chains with zero-knowledge contracts: a new normal for decentralized ledgers?New second preimage attacks on dithered hash functions with low memory complexityCollision analysis of one kind of chaos-based hash functionKeyed hash function based on a chaotic mapA simple variant of the Merkle-Damgård scheme with a permutationOn the Strength of the Concatenated Hash Combiner When All the Hash Functions Are WeakImproved collision detection of MD5 with additional sufficient conditionsNew Techniques for Cryptanalysis of Hash Functions and Improved Attacks on SnefruVortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less MultiplicationHow to Build a Hash Function from Any Collision-Resistant FunctionBoosting Merkle-Damgård Hashing for Message AuthenticationConcurrent signature without random oraclesNew Constructions for Secure Hash FunctionsModeling Random Oracles Under Unpredictable QueriesMJH: a faster alternative to MDC-2Simple hash function using discrete-time quantum walksCryptanalysis of MD2Cryptanalysis of SHA-0 and reduced SHA-1Constructing Cryptographic Hash Functions from Fixed-Key BlockciphersOn the collision and preimage security of MDC-4 in the ideal cipher modelНекоторые методы анализа функций хэширования и их применение к алгоритму ГОСТ Р 34.11-94Extended Multi-Property-Preserving and ECM-ConstructionAn Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash FunctionsA New Mode of Operation for Block Ciphers and Length-Preserving MACsLinear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic AttacksOn the impossibility of highly-efficient blockcipher-based hash functionsDomain extender for collision resistant hash functions: Improving upon Merkle-Damgård iterationIncreasing the flexibility of the herding attackSpecification governor for fault tolerant control of large-scale manufacturing systemsHash function based on quantum walksHash Functions and RFID Tags: Mind the GapThe rebound attack and subspace distinguishers: application to WhirlpoolInstantiation of quantum point obfuscationA quantum hash function with grouped coarse-grained boson samplingCollision-resistant and pseudorandom function based on Merkle-Damgård hash functionOn the security of RFID anti-counting security protocol (ACSP)