Attacks on a double length blockcipher-based hash proposal
From MaRDI portal
Publication:892386
Recommendations
- scientific article; zbMATH DE number 1498330
- Some Attacks Against a Double Length Hash Proposal
- Attacks on fast double block length hash functions
- Security of cyclic double block length hash functions
- scientific article; zbMATH DE number 1088934
- Blockcipher-based double-length hash functions for pseudorandom oracles
- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
- Cryptography and Coding
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Towards Optimal Double-Length Hash Functions
Cites work
- scientific article; zbMATH DE number 503327 (Why is no real title available?)
- scientific article; zbMATH DE number 1024071 (Why is no real title available?)
- scientific article; zbMATH DE number 1942427 (Why is no real title available?)
- scientific article; zbMATH DE number 954401 (Why is no real title available?)
- A New Double-Block-Length Hash Function Using Feistel Structure
- Another glance at double-length hashing
- Attacks on fast double block length hash functions
- Blockcipher-Based Hashing Revisited
- Combining Compression Functions and Block Cipher-Based Hash Functions
- Cryptography and Coding
- Fast Software Encryption
- Finding Collisions in the Full SHA-1
- How to Break MD5 and Other Hash Functions
- Multi-property-preserving domain extension using polynomial-based modes of operation
- On the Security of Tandem-DM
- Security of cyclic double block length hash functions
- Some Attacks Against a Double Length Hash Proposal
- Some Plausible Constructions of Double-Block-Length Hash Functions
- The Collision Intractability of MDC-2 in the Ideal-Cipher Model
- Towards Optimal Double-Length Hash Functions
Cited in
(8)- BLOCKCHAIN DOUBLE-SPEND ATTACK DURATION
- Some Attacks Against a Double Length Hash Proposal
- A New Double-Block-Length Hash Function Using Feistel Structure
- A new one time password mechanism for client-server applications
- scientific article; zbMATH DE number 1088934 (Why is no real title available?)
- A new authentication procedure for client-server applications using HMAC
- Attacks on fast double block length hash functions
- scientific article; zbMATH DE number 1583800 (Why is no real title available?)
This page was built for publication: Attacks on a double length blockcipher-based hash proposal
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q892386)