Practical Key Recovery Attack against Secret-IV Edon-
暂无分享,去创建一个
[1] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[2] Donghoon Chang,et al. Improved Indifferentiability Security Analysis of chopMD Hash Function , 2008, FSE.
[3] Victor Shoup. Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings , 2005, CRYPTO.
[4] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[5] Wei Wang,et al. New Distinguishing Attack on MAC Using Secret-Prefix Method , 2009, FSE.
[6] Gerhard Goos,et al. Fast Software Encryption , 2001, Lecture Notes in Computer Science.
[7] Mohamed El-Hadedy,et al. Cryptographic hash function Edon-R′ , 2009, 2009 Proceedings of the 1st International Workshop on Security and Communication Networks.
[8] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[9] Niels Ferguson,et al. Detectable correlations in Edon-R , 2009, IACR Cryptol. ePrint Arch..
[10] Bart Preneel,et al. On the Security of Iterated Message Authentication Codes , 1999, IEEE Trans. Inf. Theory.
[11] Lawrence C. Stewart,et al. An Extension to HTTP : Digest Access Authentication , 1997, RFC.
[12] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.