Joux multicollisions attack in sponge construction
暂无分享,去创建一个
[1] Antoine Joux,et al. Collisions of SHA-0 and Reduced SHA-1 , 2005, EUROCRYPT.
[2] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[3] Stefan Lucks,et al. Design Principles for Iterated Hash Functions , 2004, IACR Cryptol. ePrint Arch..
[4] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[5] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[6] I. F. Alshaikhli,et al. Comparison and Analysis Study of SHA-3 Finalists , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).
[7] Eli Biham,et al. A Framework for Iterative Hash Functions - HAIFA , 2007, IACR Cryptol. ePrint Arch..
[8] Antoine Joux,et al. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , 2004, CRYPTO.
[9] Mridul Nandi,et al. Speeding Up the Wide-Pipe: Secure and Fast Hashing , 2010, INDOCRYPT.
[10] Douglas R. Stinson,et al. Cryptography: Theory and Practice,Second Edition , 2002 .
[11] Josef Pieprzyk,et al. Finding Good Differential Patterns for Attacks on SHA-1 , 2005, WCC.