The following pages link to Skein Hash (Q32296):
Displayed 34 items.
- New second-preimage attacks on hash functions (Q321303) (← links)
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher (Q680941) (← links)
- Rotational rebound attacks on reduced Skein (Q744348) (← links)
- Open problems in hash function security (Q887443) (← links)
- A measure of dependence for cryptographic primitives relative to ideal functions (Q888120) (← links)
- The DBlock family of block ciphers (Q893839) (← links)
- Introducing the counter mode of operation to compressed sensing based encryption (Q903367) (← links)
- Improved generic attacks against hash-based MACs and HAIFA (Q1688402) (← links)
- Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model (Q1801090) (← links)
- Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK (Q1981795) (← links)
- Differential property of \textsc{Present}-like structure (Q2413209) (← links)
- Feistel-inspired scrambling improves the quality of linear congruential generators (Q2628127) (← links)
- Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher (Q2692967) (← links)
- Authenticated Encryption with Small Stretch (or, How to Accelerate AERO) (Q2817823) (← links)
- Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA (Q2817825) (← links)
- Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey (Q2822690) (← links)
- Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers (Q2835582) (← links)
- Boomerang Attacks on Hash Function Using Auxiliary Differentials (Q2890006) (← links)
- How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers (Q2958133) (← links)
- Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC (Q2975805) (← links)
- Collisions of MMO-MD5 and Their Impact on Original MD5 (Q3011908) (← links)
- On the Security of Hash Functions Employing Blockcipher Postprocessing (Q3013082) (← links)
- The Additive Differential Probability of ARX (Q3013093) (← links)
- Expedient Non-malleability Notions for Hash Functions (Q3073712) (← links)
- The Differential Analysis of S-Functions (Q3084242) (← links)
- Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal (Q3104710) (← links)
- Lightweight Implementations of SHA-3 Candidates on FPGAs (Q3104746) (← links)
- Вероятностные характеристики разностных и линейных соотношений для неоднородной линейной среды (Q3383053) (← links)
- Разностные характеристики основных операций ARX-шифров (Q3383132) (← links)
- Extracts from the SHA-3 Competition (Q3455489) (← links)
- The Boomerang Attacks on the Round-Reduced Skein-512 (Q3455506) (← links)
- Provable Security of BLAKE with Non-ideal Compression Function (Q3455508) (← links)
- Tweaking Even-Mansour Ciphers (Q3457110) (← links)
- McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes (Q4899705) (← links)