Pages that link to "Item:Q5451086"
From MaRDI portal
The following pages link to A Failure-Friendly Design Principle for Hash Functions (Q5451086):
Displayed 31 items.
- Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier (Q293718) (← links)
- New second-preimage attacks on hash functions (Q321303) (← links)
- A simple variant of the Merkle-Damgård scheme with a permutation (Q431787) (← links)
- Optimal collision security in double block length hashing with single length key (Q522211) (← links)
- A synthetic indifferentiability analysis of some block-cipher-based hash functions (Q1009050) (← links)
- Security analysis of randomize-hash-then-sign digital signatures (Q1928773) (← links)
- Simple hash function using discrete-time quantum walks (Q1993832) (← links)
- Fast correlation attack on stream cipher ABC v3 (Q2250730) (← links)
- Hash Functions from Defective Ideal Ciphers (Q2790047) (← links)
- One-Key Compression Function Based MAC with Security Beyond Birthday Bound (Q2817474) (← links)
- Boomerang Distinguisher for the SIMD-512 Compression Function (Q3104738) (← links)
- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n (Q3399201) (← links)
- Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL (Q3399202) (← links)
- Collisions for Round-Reduced LAKE (Q3511169) (← links)
- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak (Q3519537) (← links)
- The Hash Function Family LAKE (Q3525660) (← links)
- A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier (Q3525682) (← links)
- Collisions for RC4-Hash (Q3540156) (← links)
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers (Q3600233) (← links)
- Slide Attacks on a Class of Hash Functions (Q3600370) (← links)
- How to Fill Up Merkle-Damgård Hash Functions (Q3600380) (← links)
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures (Q3627429) (← links)
- Cryptanalysis of MDC-2 (Q3627430) (← links)
- A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier (Q3627438) (← links)
- Hash function requirements for Schnorr signatures (Q3632752) (← links)
- Boosting Merkle-Damgård Hashing for Message Authentication (Q5387101) (← links)
- Multilane HMAC— Security beyond the Birthday Limit (Q5458198) (← links)
- Extended Multi-Property-Preserving and ECM-Construction (Q5458224) (← links)
- Security/Efficiency Tradeoffs for Permutation-Based Hashing (Q5458594) (← links)
- How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions (Q5505473) (← links)
- Building indifferentiable compression functions from the PGV compression functions (Q5963372) (← links)