Second Preimage Attacks on Dithered Hash Functions
From MaRDI portal
Publication:5458597
DOI10.1007/978-3-540-78967-3_16zbMath1149.94302OpenAlexW1479724230WikidataQ57006289 ScholiaQ57006289MaRDI QIDQ5458597
John Kelsey, Pierre-Alain Fouque, Elena Andreeva, Charles Bouillaguet, Adi Shamir, Sébastien Zimmer, Jonathan Hoch
Publication date: 15 April 2008
Published in: Advances in Cryptology – EUROCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78967-3_16
Related Items
Provable Chosen-Target-Forced-Midfix Preimage Resistance, Improved indifferentiability security bound for the JH mode, Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier, A powerful abelian square-free substitution over 4 letters, New second-preimage attacks on hash functions, Security analysis of randomize-hash-then-sign digital signatures, Generic attacks on hash combiners, How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?, On the complexity of the herding attack and some related attacks on hash functions, New second preimage attacks on dithered hash functions with low memory complexity, Avoiding Abelian squares in partial words, Abelian repetitions in partial words, Linear Analysis of Reduced-Round CubeHash, How to Fill Up Merkle-Damgård Hash Functions, (Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach, Cryptanalysis of Vortex, A Three-Property-Secure Hash Function, Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n, Increasing the flexibility of the herding attack, Faster Multicollisions