Pseudo-Cryptanalysis of Luffa
暂无分享,去创建一个
Yvo Desmedt | Keting Jia | Xiaoyun Wang | Lidong Han | Y. Desmedt | Xiaoyun Wang | Lidong Han | Keting Jia
[1] Hugo Krawczyk,et al. Message Authentication using Hash Functions , 1996 .
[2] Claus-Peter Schnorr. Enhancing the security of perfect blind DL-signatures , 2006, Inf. Sci..
[3] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[4] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[5] Gaëtan Leurent,et al. Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5 , 2007, CRYPTO.
[6] David A. Wagner,et al. A Generalized Birthday Problem , 2002, CRYPTO.
[7] Xiaoyun Wang,et al. Efficient Collision Search Attacks on SHA-0 , 2005, CRYPTO.
[8] Scott Contini,et al. Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions , 2006, ASIACRYPT.
[9] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[10] Bruce Schneier,et al. Second Primages on n-bit Hash Functions for Much Less than 2n Work | NIST , 2005 .
[11] Hui Chen,et al. Cryptanalysis of the Hash Functions MD4 and RIPEMD , 2005, EUROCRYPT.
[12] Xiaoyun Wang,et al. The Second-Preimage Attack on MD4 , 2005, CANS.