Author:
Andreeva Elena,Mennink Bart
Publisher
Springer Berlin Heidelberg
Reference18 articles.
1. Lecture Notes in Computer Science;E. Andreeva,2009
2. Lecture Notes in Computer Science;E. Andreeva,2008
3. Lecture Notes in Computer Science;E. Andreeva,2007
4. Lecture Notes in Computer Science;M. Bellare,2006
5. Biham, E., Dunkelman, O.: A framework for iterative hash functions – HAIFA. Cryptology ePrint Archive, Report 2007/278 (2007)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Nostradamus Goes Quantum;Advances in Cryptology – ASIACRYPT 2022;2022
2. Research on the Security Criteria of Hash Functions in the Blockchain;Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts - BCC '18;2018
3. On Bitcoin Security in the Presence of Broken Cryptographic Primitives;Computer Security – ESORICS 2016;2016
4. New Second-Preimage Attacks on Hash Functions;Journal of Cryptology;2015-06-23
5. Increasing the flexibility of the herding attack;Information Processing Letters;2012-01