Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1024070 - MaRDI portal

scientific article; zbMATH DE number 1024070

From MaRDI portal
Publication:4341762

zbMath0877.94039MaRDI QIDQ4341762

René Govaerts, Bart Preneel, Joos Vandewalle

Publication date: 18 June 1997


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (68)

Blockcipher-Based Double-Length Hash Functions for Pseudorandom OraclesConstruction of one-way hash functions with increased key space using adaptive chaotic mapsThe Whirlpool Secure Hash FunctionNew criterion for diffusion property and applications to improved GFS and EGFNCryptanalysis of Reduced-Round WhirlwindCharacterizing collision and second-preimage resistance in LinicryptAn analysis of the blockcipher-based hash functions from PGVSecurity analysis of randomize-hash-then-sign digital signaturesTowards Understanding the Known-Key Security of Block CiphersSecurity analysis of Even-Mansour structure hash functionsOpen problems in hash function securityCryptanalysis of GrindahlIndifferentiability of the confusion-diffusion network and the cascade block cipherKnown-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modesMeet-in-the-middle preimage attacks on sponge-based hashingRandomized half-ideal cipher on groups with applications to UC (a)PAKESuperposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashingBlock-cipher-based tree hashingHow (Not) to Efficiently Dither Blockcipher-Based Hash Functions?The universality of iterated hashing over variable-length stringsSecurity of truncated permutation without initial valueAutomatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentialsCollision attack on \({\mathtt Grindahl}\)Simplified MITM modeling for permutations: new (quantum) attacks\textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function\texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applicationsBeyond birthday bound secure fresh rekeying: application to authenticated encryptionA simple variant of the Merkle-Damgård scheme with a permutationSecurity of permutation-based compression function {\textsf{lp}}231A new black box analysis of hash functions based on block ciphersHow to Build a Hash Function from Any Collision-Resistant FunctionNew Constructions for Secure Hash FunctionsMJH: a faster alternative to MDC-2Analysis of Message Injection in Stream Cipher-Based Hash FunctionsCollisions of MMO-MD5 and Their Impact on Original MD5On the Security of Hash Functions Employing Blockcipher PostprocessingMeet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolKnown-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing ModesOptimal collision security in double block length hashing with single length keyTruncated differential based known-key attacks on round-reduced SIMONCollision Resistant Double-Length HashingInterpreting Hash Function Security ProofsConstructing Cryptographic Hash Functions from Fixed-Key BlockciphersPseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512Building indifferentiable compression functions from the PGV compression functionsAn Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash FunctionsA New Mode of Operation for Block Ciphers and Length-Preserving MACsMJH: A Faster Alternative to MDC-2Expedient Non-malleability Notions for Hash FunctionsCryptanalysis of the Authenticated Encryption Algorithm COFFESpeeding up Collision Search for Byte-Oriented Hash FunctionsA synthetic indifferentiability analysis of some block-cipher-based hash functionsOn Randomizing Hash Functions to Strengthen the Security of Digital SignaturesSalvaging Merkle-Damgård for Practical ApplicationsOptimised probabilistic active learning (OPAL)A New Double-Block-Length Hash Function Using Feistel StructureAutomatic search of meet-in-the-middle preimage attacks on AES-like hashingDistinguishers for Ciphers and Known Key Attack against Rijndael with Large BlocksSecurity of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher ModelCryptanalysis of Tweaked Versions of SMASH and ReparationA Scheme to Base a Hash Function on a Block CipherOn the impossibility of highly-efficient blockcipher-based hash functionsLinicrypt: A Model for Practical CryptographyStructural Attacks on Two SHA-3 Candidates: Blender-n and DCH-nPreimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\)Integrality Authentication Scheme of Bluetooth Baseband Packet Header Based on Key StreamFaster MulticollisionsQuantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions




This page was built for publication: