Provable Chosen-Target-Forced-Midfix Preimage Resistance
From MaRDI portal
Publication:2889862
DOI10.1007/978-3-642-28496-0_3zbMath1292.94020OpenAlexW109175168MaRDI QIDQ2889862
Publication date: 8 June 2012
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28496-0_3
Related Items (3)
New second-preimage attacks on hash functions ⋮ Nostradamus goes quantum ⋮ Increasing the flexibility of the herding attack
Cites Work
- Unnamed Item
- Unnamed Item
- On the complexity of the herding attack and some related attacks on hash functions
- Herding Hash Functions and the Nostradamus Attack
- Hash function requirements for Schnorr signatures
- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
- Advances in Cryptology – CRYPTO 2004
- Birthday Paradox for Multi-collisions
- A Simple Variant of the Merkle-Damgård Scheme with a Permutation
- Seven-Property-Preserving Iterated Hashing: ROX
- Constructing an Ideal Hash Function from Weak Ideal Compression Functions
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Second Preimage Attacks on Dithered Hash Functions
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
This page was built for publication: Provable Chosen-Target-Forced-Midfix Preimage Resistance