Pages that link to "Item:Q5385746"
From MaRDI portal
The following pages link to Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work (Q5385746):
Displaying 46 items.
- Improved indifferentiability security bound for the JH mode (Q285241) (← links)
- Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier (Q293718) (← links)
- New second-preimage attacks on hash functions (Q321303) (← links)
- On the complexity of the herding attack and some related attacks on hash functions (Q420639) (← links)
- A new black box analysis of hash functions based on block ciphers (Q655110) (← links)
- Increasing the flexibility of the herding attack (Q763502) (← links)
- Open problems in hash function security (Q887443) (← links)
- Collision attack on \({\mathtt Grindahl}\) (Q901374) (← links)
- Improved generic attacks against hash-based MACs and HAIFA (Q1688402) (← links)
- New second preimage attacks on dithered hash functions with low memory complexity (Q1698640) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- New records of pre-image search of reduced SHA-1 using SAT solvers (Q2079908) (← links)
- Generic attacks on hash combiners (Q2188959) (← links)
- Fast correlation attack on stream cipher ABC v3 (Q2250730) (← links)
- Differential property of \textsc{Present}-like structure (Q2413209) (← links)
- Memory-Efficient Algorithms for Finding Needles in Haystacks (Q2829215) (← links)
- Linear Analysis of Reduced-Round CubeHash (Q3011313) (← links)
- An Improved Algebraic Attack on Hamsi-256 (Q3013079) (← links)
- Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool (Q3013095) (← links)
- (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach (Q3073708) (← links)
- The Latin squares and the secret sharing schemes (Q3085992) (← links)
- Provable Security of BLAKE with Non-ideal Compression Function (Q3455508) (← links)
- Cryptanalysis of Grindahl (Q3498399) (← links)
- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? (Q3506390) (← links)
- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak (Q3519537) (← links)
- MD4 is Not One-Way (Q3525692) (← links)
- Collisions for RC4-Hash (Q3540156) (← links)
- Herding Hash Functions and the Nostradamus Attack (Q3593096) (← links)
- Slide Attacks on a Class of Hash Functions (Q3600370) (← links)
- How to Fill Up Merkle-Damgård Hash Functions (Q3600380) (← links)
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures (Q3627429) (← links)
- Cryptanalysis of MDC-2 (Q3627430) (← links)
- Finding Preimages in Full MD5 Faster Than Exhaustive Search (Q3627432) (← links)
- A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier (Q3627438) (← links)
- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security (Q3634492) (← links)
- On the Weak Ideal Compression Functions (Q3634496) (← links)
- Preimage Attacks on One-Block MD4, 63-Step MD5 and More (Q3644195) (← links)
- A Three-Property-Secure Hash Function (Q3644203) (← links)
- Некоторые методы анализа функций хэширования и их применение к алгоритму ГОСТ Р 34.11-94 (Q4959056) (← links)
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks (Q5458931) (← links)
- Hash Functions and RFID Tags: Mind the Gap (Q5502785) (← links)
- Faster Multicollisions (Q5504611) (← links)
- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions (Q5505473) (← links)
- Building indifferentiable compression functions from the PGV compression functions (Q5963372) (← links)
- Quantum attacks on hash constructions with low quantum random access memory (Q6595804) (← links)
- Improving generic attacks using exceptional functions (Q6652911) (← links)