Security Reductions of the Second Round SHA-3 Candidates
From MaRDI portal
Publication:3073779
DOI10.1007/978-3-642-18178-8_5zbMath1371.94619OpenAlexW2058940365MaRDI QIDQ3073779
Bart Mennink, Elena Andreeva, Bart Preneel
Publication date: 11 February 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-18178-8_5
Related Items (8)
Improved indifferentiability security bound for the JH mode ⋮ Extracts from the SHA-3 Competition ⋮ Provable Security of BLAKE with Non-ideal Compression Function ⋮ Open problems in hash function security ⋮ Tight preimage resistance of the sponge construction ⋮ StriBob: аутентифицированное шифрование с помощью подстановки LPS из ГОСТ Р 34.11-2012 ⋮ The NIST SHA-3 Competition: A Perspective on the Final Year ⋮ Compactness of hashing modes and efficiency beyond Merkle tree
This page was built for publication: Security Reductions of the Second Round SHA-3 Candidates