Attacks on a double length blockcipher-based hash proposal
From MaRDI portal
Publication:892386
DOI10.1007/S12095-014-0117-2zbMath1343.94073OpenAlexW2020652861MaRDI QIDQ892386
Tiejun Jia, Yiyuan Luo, Xuejia Lai
Publication date: 19 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-014-0117-2
Related Items (2)
A new authentication procedure for client-server applications using HMAC ⋮ A new one time password mechanism for client-server applications
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Attacks on fast double block length hash functions
- Blockcipher-Based Hashing Revisited
- On the Security of Tandem-DM
- Multi-property-preserving Domain Extension Using Polynomial-Based Modes of Operation
- Some Plausible Constructions of Double-Block-Length Hash Functions
- A New Double-Block-Length Hash Function Using Feistel Structure
- Security of Cyclic Double Block Length Hash Functions
- Another Glance at Double-Length Hashing
- How to Break MD5 and Other Hash Functions
- Cryptography and Coding
- The Collision Intractability of MDC-2 in the Ideal-Cipher Model
- Towards Optimal Double-Length Hash Functions
- Finding Collisions in the Full SHA-1
- Some Attacks Against a Double Length Hash Proposal
- Combining Compression Functions and Block Cipher-Based Hash Functions
- Fast Software Encryption
This page was built for publication: Attacks on a double length blockcipher-based hash proposal