Attacks on a double length blockcipher-based hash proposal
From MaRDI portal
Publication:892386
DOI10.1007/S12095-014-0117-2zbMATH Open1343.94073OpenAlexW2020652861MaRDI QIDQ892386FDOQ892386
Authors: Yiyuan Luo, Xuejia Lai, Tiejun Jia
Publication date: 19 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-014-0117-2
Recommendations
- scientific article; zbMATH DE number 1498330
- Some Attacks Against a Double Length Hash Proposal
- Attacks on fast double block length hash functions
- Security of cyclic double block length hash functions
- scientific article; zbMATH DE number 1088934
- Blockcipher-based double-length hash functions for pseudorandom oracles
- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
- Cryptography and Coding
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Towards Optimal Double-Length Hash Functions
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Finding Collisions in the Full SHA-1
- Title not available (Why is that?)
- How to Break MD5 and Other Hash Functions
- Multi-property-preserving domain extension using polynomial-based modes of operation
- Towards Optimal Double-Length Hash Functions
- Attacks on fast double block length hash functions
- Blockcipher-Based Hashing Revisited
- On the Security of Tandem-DM
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Security of cyclic double block length hash functions
- Another glance at double-length hashing
- Cryptography and Coding
- The Collision Intractability of MDC-2 in the Ideal-Cipher Model
- Combining Compression Functions and Block Cipher-Based Hash Functions
- Fast Software Encryption
- Title not available (Why is that?)
- A New Double-Block-Length Hash Function Using Feistel Structure
- Some Attacks Against a Double Length Hash Proposal
Cited In (8)
- A New Double-Block-Length Hash Function Using Feistel Structure
- Title not available (Why is that?)
- A new one time password mechanism for client-server applications
- Title not available (Why is that?)
- Some Attacks Against a Double Length Hash Proposal
- A new authentication procedure for client-server applications using HMAC
- BLOCKCHAIN DOUBLE-SPEND ATTACK DURATION
- Attacks on fast double block length hash functions
This page was built for publication: Attacks on a double length blockcipher-based hash proposal
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q892386)