Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output
暂无分享,去创建一个
[1] Willi Meier,et al. SHA-3 proposal BLAKE , 2009 .
[2] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[3] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[4] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[5] Martijn Stam,et al. Blockcipher-Based Hashing Revisited , 2009, FSE.
[6] Dan Boneh,et al. On the Impossibility of Efficiently Combining Collision Resistant Hash Functions , 2006, CRYPTO.
[7] Luca Trevisan,et al. Amplifying Collision Resistance: A Complexity-Theoretic Treatment , 2007, CRYPTO.
[8] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[9] Marc Stevens,et al. Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate , 2009, CRYPTO.
[10] Christophe De Cannière,et al. Finding SHA-1 Characteristics: General Results and Applications , 2006, ASIACRYPT.
[11] Luca Trevisan,et al. Notions of Reducibility between Cryptographic Primitives , 2004, TCC.
[12] Yu Sasaki,et al. Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1 , 2009, CRYPTO.
[13] Florian Mendel,et al. Symmetric Cryptography , 2009 .
[14] Krzysztof Pietrzak,et al. Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist , 2007, EUROCRYPT.
[15] Yu Sasaki,et al. Finding Preimages in Full MD5 Faster Than Exhaustive Search , 2009, EUROCRYPT.
[16] Stefan Lucks,et al. The Skein Hash Function Family , 2009 .
[17] Thomas Shrimpton,et al. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance , 2004, FSE.
[18] Christophe De Cannière,et al. Preimages for Reduced SHA-0 and SHA-1 , 2008, CRYPTO.
[19] Hongjun Wu,et al. The Hash Function JH , 2009 .
[20] Krzysztof Pietrzak,et al. Compression from Collisions, or Why CRHF Combiners Have a Long Output , 2008, CRYPTO.
[21] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[22] Alan O. Freier,et al. Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .
[23] Michal Rjasko. On Existence of Robust Combiners for Cryptographic Hash Functions , 2009, ITAT.