Results
Found 62 publication records. Showing 62 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
154 | Takanori Isobe 0001, Kyoji Shibutani |
Preimage Attacks on Reduced Tiger and SHA-2. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger |
148 | Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang 0001 |
The Second-Preimage Attack on MD4. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
collision differential path, weak message, Hash function, second-preimage |
146 | Elena Andreeva 0001, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer |
Second Preimage Attacks on Dithered Hash Functions. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Hash Function, Dithering |
134 | Phillip Rogaway, Thomas Shrimpton |
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
preimage resistance, second-preimage resistance, provable security, cryptographic hash functions, collision resistance |
103 | Gaoli Wang, Shaohui Wang |
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
key-recovery, HMAC, second preimage attack, NMAC, HAVAL |
88 | Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume |
Digital Signatures Out of Second-Preimage Resistant Hash Functions. |
PQCrypto |
2008 |
DBLP DOI BibTeX RDF |
second-preimage resistance, provable security, Merkle signatures |
86 | Florian Mendel, Norbert Pramstaller, Christian Rechberger |
A (Second) Preimage Attack on the GOST Hash Function. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, preimage attack |
77 | Yu Sasaki |
Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
DMMD, collision, HMAC, second preimage, AURORA |
75 | Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, John Kelsey |
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Herding attack, Trojan message attack, Zipper hash, Concatenated hash, Tree hash, Second preimage attack |
75 | Kota Ideguchi, Dai Watanabe |
Second Preimage Attack on SHAMATA-512. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
SHAMATA, hash function, second preimage attack, SHA-3 candidate |
75 | Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu |
Distinguishing and Second-Preimage Attacks on CBC-Like MACs. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
CBC, MAC, Distinguishing attack, Second preimage attack |
73 | Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong |
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL |
60 | Florian Mendel, Christian Rechberger, Martin Schläffer |
Cryptanalysis of Twister. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Twister, hash function, collision-, preimage attack, SHA-3, second-preimage- |
60 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt |
Cryptanalysis of the GOST Hash Function. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, collision attack, preimage attack, second preimage attack |
52 | Norbert Pramstaller, Mario Lamberger, Vincent Rijmen |
Second Preimages for Iterated Hash Functions and Their Implications on MACs. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions |
47 | Kan Yasuda |
How to Fill Up Merkle-Damgård Hash Functions. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Merkle-Damgård, second-preimage resistance, one-wayness, hash function, padding |
46 | Jian Zou, Wenling Wu, Shuang Wu 0004, Le Dong |
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function. |
J. Inf. Sci. Eng. |
2014 |
DBLP BibTeX RDF |
|
46 | Deukjo Hong, Bonwook Koo, Dong-Chan Kim |
Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2012 |
DBLP DOI BibTeX RDF |
|
46 | Jian Zou, Wenling Wu, Shuang Wu 0004, Le Dong |
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
46 | Phillip Rogaway, Thomas Shrimpton |
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
45 | John Kelsey, Bruce Schneier |
Second Preimages on n-Bit Hash Functions for Much Less than 2n Work. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Second Preimages for SMASH. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
SMASH, cryptanalysis, hash functions, second preimages |
30 | Donghoon Chang, Mridul Nandi |
Improved Indifferentiability Security Analysis of chopMD Hash Function. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Elena Andreeva 0001, Gregory Neven, Bart Preneel, Thomas Shrimpton |
Seven-Property-Preserving Iterated Hashing: ROX. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu 0001 |
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
ROX, ESh, Hash Functions, MPP, Domain Extension |
28 | Eli Biham |
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen |
The Grindahl Hash Functions. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
hash functions, AES, Rijndael, proposal, design strategy |
28 | Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002, Soo Hak Sung |
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Daniel J. Bernstein, Andreas Hülsing |
Decisional second-preimage resistance: When does SPR imply PRE? |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
26 | Ian McQuoid, Trevor Swope, Mike Rosulek |
Characterizing Collision and Second-Preimage Resistance in Linicrypt. |
TCC (1) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Daniel J. Bernstein, Andreas Hülsing |
Decisional Second-Preimage Resistance: When Does SPR Imply PRE? |
ASIACRYPT (3) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Ian McQuoid, Trevor Swope, Mike Rosulek |
Characterizing Collision and Second-Preimage Resistance in Linicrypt. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
26 | Zhenzhen Bao, Lei Wang 0031, Jian Guo 0001, Dawu Gu |
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
26 | Zhenzhen Bao, Lei Wang 0031, Jian Guo 0001, Dawu Gu |
Functional Graph Revisited: Updates on (Second) Preimage Attacks on Hash Combiners. |
CRYPTO (2) |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer |
New Second-Preimage Attacks on Hash Functions. |
J. Cryptol. |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Gautham Sekar, Soumyadeep Bhattacharya |
Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions. |
J. Inf. Process. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Muhammad Barham, Orr Dunkelman, Stefan Lucks, Marc Stevens 0001 |
New Second Preimage Attacks on Dithered Hash Functions with Low Memory Complexity. |
SAC |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Shiwei Chen, Chenhui Jin |
A second preimage attack on zipper hash. |
Secur. Commun. Networks |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Jian Guo 0001, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang 0031 |
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
26 | Riham AlTawy, Amr M. Youssef |
Second Preimage Analysis of Whirlwind. |
Inscrypt |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Jian Guo 0001, Jérémy Jean, Gaëtan Leurent, Thomas Peyrin, Lei Wang 0031 |
The Usage of Counter Revisited: Second-Preimage Attack on New Russian Standardized Hash Function. |
Selected Areas in Cryptography |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Tuomas Kortelainen, Juha Kortelainen |
New Second Preimage Attack Variants against the MD-Structure. |
CANS |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Gautham Sekar, Soumyadeep Bhattacharya |
Practical (Second) Preimage Attacks on TCS_SHA-3. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
26 | Charles Bouillaguet, Bastien Vayssière |
Provable Second Preimage Resistance Revisited. |
Selected Areas in Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Lei Wang 0031, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta |
Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Bart Preneel |
Second Preimage Resistance. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | |
Everywhere Second Preimage Resistant Hash Function (esec). |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Lei Wang 0031, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, Kazuo Sakiyama |
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach. |
CT-RSA |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Christian Rechberger |
Second-Preimage Analysis of Reduced SHA-1. |
ACISP |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Shiwei Chen, Chenhui Jin |
A Second Preimage Attack on the Merkle-Damgard Scheme with a Permutation for Hash Functions. |
SECRYPT |
2009 |
DBLP BibTeX RDF |
|
26 | Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu |
Distinguishing Attack and Second-Preimage Attack on the CBC-like MACs. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
26 | Charles Bouillaguet, Pierre-Alain Fouque, Adi Shamir, Sébastien Zimmer |
Second Preimage Attacks on Dithered Hash Functions. |
IACR Cryptol. ePrint Arch. |
2007 |
DBLP BibTeX RDF |
|
26 | Bart Preneel |
Second preimage resistance. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Jianyong Huang, Jennifer Seberry, Willy Susilo |
On the Internal Structure of Alpha-MAC. |
VIETCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Praveen Gauravaram, Lars R. Knudsen |
On Randomizing Hash Functions to Strengthen the Security of Digital Signatures. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Davies-Meyer, RMX, Digital signatures, Hash functions |
17 | Dmitry Khovratovich |
Two Attacks on RadioGatún. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
sponge, cryptanalysis, hash functions |
15 | Kan Yasuda |
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
birthday bound, MAC, message authentication code, unforgeability, unpredictability, domain extension |
15 | Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic |
Speeding up Collision Search for Byte-Oriented Hash Functions. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Analysis of the Hash Function Design Strategy Called SMASH. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Praveen Gauravaram, John Kelsey |
Linear-XOR and Additive Checksums Don't Protect Damgård-Merkle Hashes from Generic Attacks. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Emmanuel Bresson, Dario Catalano, Rosario Gennaro |
Improved On-Line/Off-Line Threshold Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini |
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
manual channel, eTCR hash family, randomized hashing, hash function security, Message authentication |
Displaying result #1 - #62 of 62 (100 per page; Change: )
|