Parallel collision search with cryptanalytic applications

From MaRDI portal
Publication:1284011

DOI10.1007/PL00003816zbMath0992.94028OpenAlexW2008272678WikidataQ56388136 ScholiaQ56388136MaRDI QIDQ1284011

Michael J. Wiener, Paul C. van Oorschot

Publication date: 22 September 2002

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/pl00003816




Related Items (only showing first 100 items - show all)

New algorithm for the elliptic curve discrete logarithm problem with auxiliary inputsSoK: how (not) to design and implement post-quantum cryptographyImprovements to RSA key generation and CRT on embedded devicesOn the cost of ASIC hardware crackers: a SHA-1 case studyAnother Look at TightnessImproving ECDLP Computation in Characteristic 2Reducing the Key Size of Rainbow Using Non-commutative RingsThe Supersingular Isogeny Problem in Genus 2 and BeyondHow to meet ternary LWE keysCryptanalysis of full LowMC and LowMC-M with algebraic techniquesThe cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3On index calculus algorithms for subfield curvesLow-gate quantum golden collision findingNot enough less: an improved algorithm for solving code equivalence problems over \(\mathbb{F}_q\)Provable time-memory trade-offs: symmetric cryptography against memory-bounded adversariesNonlinearities in elliptic curve authenticationA SAT-Based Approach for Index Calculus on Binary Elliptic CurvesKey-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DESImproved Information Set Decoding for Code-Based Cryptosystems with Constrained MemoryAll Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle ApproachA new approach for finding low-weight polynomial multiplesA new adaptive attack on SIDHCycle detection using a stackImplementation of point-counting algorithms on genus 2 hyperelliptic curves based on the birthday paradoxPoint counting on Picard curves in large characteristicAnalysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite DegreeImproved algorithm for the isogeny problem for ordinary elliptic curvesOn the Isogeny Problem with Torsion Point InformationComputing elliptic curve discrete logarithms with improved baby-step giant-step algorithmUsing Random Error Correcting Codes in Near-Collision Attacks on Generic Hash-FunctionsTime-Memory Trade-Offs for Near-CollisionsA variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexitySymmetric Hadamard matrices of order 116 and 172 existGeneric attacks on hash combinersCryptanalytic time-memory-data trade-offs for FX-constructions and the affine equivalence problemScalable zero knowledge via cycles of elliptic curvesImproved generic attacks against hash-based MACs and HAIFAAn efficient collision detection method for computing discrete logarithms with Pollard's rhoA New Algorithm for the Unbalanced Meet-in-the-Middle ProblemUnnamed ItemSpeeding up elliptic curve discrete logarithm computations with point halvingNew second preimage attacks on dithered hash functions with low memory complexityComputing discrete logarithms with the parallelized kangaroo method.B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsionOblivious pseudorandom functions from isogeniesAccelerating Pollard's rho algorithm on finite fieldsRecent progress on the elliptic curve discrete logarithm problemReduced memory meet-in-the-middle attack against the NTRU private keyImproved Pollard rho method for computing discrete logarithms over finite extension fieldsOn random walks for Pollard's rho methodComputing elliptic curve discrete logarithms with the negation mapFault-based attack on Montgomery's ladder algorithmOn the cost of computing isogenies between supersingular elliptic curvesMemoryless near-collisions via coding theoryA low-memory algorithm for finding short product representations in finite groups.New results on quasi-subfield polynomialsАнализ сложности алгоритма параллельного поиска “золотой” коллизииComputational hardness of IFP and ECDLPComputing low-weight discrete logarithmsNTRU prime: reducing attack surface at low costComputing discrete logarithms in an intervalTime-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2Cycle detection algorithms and their applicationsAn algorithmic framework for the generalized birthday problemA birthday paradox for Markov chains with an optimal bound for collision in the Pollard rho algorithm for discrete logarithmA low-memory algorithm for point counting on Picard curvesCryptanalysis of MD2A taxonomy of pairing-friendly elliptic curvesHerding Hash Functions and the Nostradamus AttackKeyed/Unkeyed RIPEMD-128, 192, 256The parallelized Pollard kangaroo method in real quadratic function fieldsSpeeding Up the Pollard Rho Method on Prime FieldsCryptographic implications of Hess' generalized GHS attackWeil sum for birthday attack in multivariate quadratic cryptosystemAlgebraic approaches for solving isogeny problems of prime power degreesSolving the multi-discrete logarithm problems over a group of elliptic curves with prime orderFaster Space-Efficient Algorithms for Subset Sum, $k$-Sum, and Related ProblemsResearch on attacking a special elliptic curve discrete logarithm problemIndex calculus for abelian varieties of small dimension and the elliptic curve discrete logarithm problemНекоторые методы анализа функций хэширования и их применение к алгоритму ГОСТ Р 34.11-94A Meet-in-the-Middle Collision Attack Against the New FORK-256A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve CryptographyНесколько замечаний о задаче дискретного логарифмирования на эллиптических кривыхConstruction of strong elliptic curves suitable for cryptographic applicationsOptimal Covering Codes for Finding Near-CollisionsThe Latin squares and the secret sharing schemesTight time-space lower bounds for finding multiple collision pairs and their applicationsLow weight discrete logarithm and subset sum in \(2^{0.65n}\) with polynomial memoryImproved classical cryptanalysis of SIKE in practiceIndex calculus in class groups of non-hyperelliptic curves of genus threeMemory-Efficient Algorithms for Finding Needles in HaystacksOn Free-Start Collisions and Collisions for TIB3Improving the Gaudry-Schost algorithm for multidimensional discrete logarithmsBreaking the Circuit Size Barrier for Secure Computation Under DDHSolving discrete logarithm problems faster with the aid of pre-computationThe GN-authenticated key agreementImproving the parallelized Pollard lambda search on anomalous binary curvesQuantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functionsA note on the \(x\)-coordinate of points on an elliptic curve in characteristic twoMaD0




This page was built for publication: Parallel collision search with cryptanalytic applications