Classification of the SHA-3 Candidates
暂无分享,去创建一个
[1] Joachim Rosenthal,et al. Maximum Distance Separable Convolutional Codes , 1999, Applicable Algebra in Engineering, Communication and Computing.
[2] Michael E. Kounavis,et al. Vortex: A New Family of One-Way Hash Functions Based on AES Rounds and Carry-Less Multiplication , 2008, ISC.
[3] David A. Wilson,et al. The DCH Hash Function , 2008 .
[4] Olivier Billet , .
[5] Niels Ferguson,et al. Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform , 2009, IACR Cryptol. ePrint Arch..
[6] Dai Watanabe,et al. Second Preimage Attack on SHAMATA-512 , 2009, INDOCRYPT.
[7] Mohamed El-Hadedy,et al. Cryptographic hash function Edon-R′ , 2009, 2009 Proceedings of the 1st International Workshop on Security and Communication Networks.
[8] Ronald L. Rivest. The MD 6 hash function A proposal to NIST for SHA-3 , 2008 .
[9] C. Cannière. Hash Function Luffa Supporting Document , 2008 .
[10] Vlastimil Klíma. Huge Multicollisions and Multipreimages of Hash Functions BLENDER-n , 2009, IACR Cryptol. ePrint Arch..
[11] Michael E. Kounavis,et al. Vortex: A New Family of One Way Hash Functions based on Rijndael Rounds and Carry-less Multiplication , 2008, IACR Cryptol. ePrint Arch..
[12] Anne Canteaut,et al. Internal collision attack on Maraca , 2009, Symmetric Cryptography.
[13] Bart Preneel,et al. The Lane hash function , 2009, Symmetric Cryptography.
[14] A New Hash Algorithm: Khichidi-1 , 2008, IACR Cryptol. ePrint Arch..
[15] Iwata Tetsu,et al. AURORA: A Cryptographic Hash Algorithm Family , 2009 .
[16] Alex Biryukov,et al. Hash family LUX-Algorithm Specifications and Supporting Documentation , 2008 .
[17] Bruce Schneier,et al. Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..
[18] P. Gaborit,et al. SHA-3 proposal: FSB , 2008 .
[19] Hongjun Wu,et al. The Hash Function JH , 2009 .
[20] Bart Preneel,et al. Practical Preimages for Maraca , 2009, Symmetric Cryptography.
[21] Kasteelpark Arenberg,et al. The Hash Function Hamsi , 2008 .
[22] E. Biham,et al. The SHAvite-3 Hash Function , 2008 .
[23] ZiJie Xu. Dynamic SHA , 2007, IACR Cryptol. ePrint Arch..
[24] Yixian Yang,et al. Collision attack on NaSHA-384/512 , 2010, 2010 International Conference on Networking and Information Technology.
[25] Alon Rosen,et al. SWIFFTX : A Proposal for the SHA-3 Standard , 2008 .
[26] Mohamed El-Hadedy,et al. Cryptographic hash function Blue Midnight Wish , 2009, 2009 Proceedings of the 1st International Workshop on Security and Communication Networks.
[27] Bart Preneel,et al. Practical Collisions for SHAMATA-256 , 2009, Selected Areas in Cryptography.
[28] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[29] Neil Sholer,et al. Abacus : A Candidate for SHA-3 , 2008 .
[30] Stefan Lucks,et al. Design Principles for Iterated Hash Functions , 2004, IACR Cryptol. ePrint Arch..
[31] Willi Meier,et al. SHA-3 proposal BLAKE , 2009 .
[32] Thomas Peyrin,et al. Inside the Hypercube , 2009, ACISP.
[33] Ivica Nikolic,et al. Cryptanalysis of EnRUPT , 2008, IACR Cryptol. ePrint Arch..
[34] Stefan Lucks,et al. The Skein Hash Function Family , 2009 .
[35] Florian Mendel,et al. Cryptanalysis of Twister , 2009, ACNS.
[36] Bruce Schneier,et al. Unbalanced Feistel Networks and Block Cipher Design , 1996, FSE.
[37] S. A. V. Satya Murty,et al. Huge 2ndpreimages and collisions of khichidi-1 , 2009, IACR Cryptol. ePrint Arch..
[38] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[39] Christophe De Canniere. Hash Function Lua Supporting Document , 2008 .
[40] Florian Mendel,et al. Collision Attack on Boole , 2009, ACNS.
[41] Scott R. Fluhrer. Collision Attack on the Waterfall Hash Function , 2008, IACR Cryptol. ePrint Arch..
[42] Florian Mendel,et al. Symmetric Cryptography , 2009 .