Hash Functions and RFID Tags: Mind the Gap
From MaRDI portal
Publication:5502785
DOI10.1007/978-3-540-85053-3_18zbMath1184.68229OpenAlexW2106698019MaRDI QIDQ5502785
Matthew J. B. Robshaw, Axel Poschmann, Yannick Seurin, Andrey Bogdanov, Christof Paar, Gregor Leander
Publication date: 9 January 2009
Published in: Cryptographic Hardware and Embedded Systems – CHES 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85053-3_18
Related Items (8)
Quark: a lightweight hash ⋮ LHash: A Lightweight Hash Function ⋮ Cryptanalysis of Full Sprout ⋮ Double-block-length hash function for minimum memory size ⋮ MJH: a faster alternative to MDC-2 ⋮ Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool ⋮ MJH: A Faster Alternative to MDC-2 ⋮ A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- HIGHT: A New Block Cipher Suitable for Low-Resource Device
- Security Analysis of Constructions Combining FIL Random Oracles
- New Lightweight DES Variants
- PRESENT: An Ultra-Lightweight Block Cipher
- SQUASH – A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags
- Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Advances in Cryptology – CRYPTO 2004
- How to Break MD5 and Other Hash Functions
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- The Collision Intractability of MDC-2 in the Ideal-Cipher Model
- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
- Finding Collisions in the Full SHA-1
- Authenticating Pervasive Devices with Human Protocols
- Combining Compression Functions and Block Cipher-Based Hash Functions
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions
- One Way Hash Functions and DES
This page was built for publication: Hash Functions and RFID Tags: Mind the Gap