Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
Top Cited Papers
- 1 January 2005
- book chapter
- Published by Springer Nature
- p. 474-490
- https://doi.org/10.1007/11426639_28
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Handbook of Applied CryptographyPublished by Taylor & Francis ,2018
- On The Security of Key Derivation FunctionsPublished by Springer Nature ,2004
- Multicollisions in Iterated Hash Functions. Application to Cascaded ConstructionsPublished by Springer Nature ,2004
- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGVPublished by Springer Nature ,2002
- A Practice-Oriented Treatment of Pseudorandom Number GeneratorsPublished by Springer Nature ,2002
- Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number GeneratorPublished by Springer Nature ,2000
- Information HidingPublished by Springer Nature ,1996
- Differential Cryptanalysis of the Data Encryption StandardPublished by Springer Nature ,1993
- A fast software one-way hash functionJournal of Cryptology, 1990
- Detection of Subsurface Flow PhenomenaPublished by Springer Nature ,1989