Author:
Black John,Rogaway Phillip,Shrimpton Thomas
Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. J. Black, P. Rogaway, and T. Shrimpton. Black-box analysis of the blockcipher-based hash-function constructions from PGV. Full version of this paper, http://www.cs.ucdavis.edu/~rogaway , 2002.
2. I. Damgøard. A design principle for hash functions. In G. Brassard, editor, Advances in Cryptology — CRYPTO’ 89, volume 435 of Lecture Notes in Computer Science. Springer-Verlag, 1990.
3. S. Even and Y. Mansour. A construction of a cipher from a single pseudorandom permutation. In Advances in Cryptology — ASIACRYPT’ 91, volume 739 of Lecture Notes in Computer Science, pages 210–224. Springer-Verlag, 1992.
4. J. Kilian and P. Rogaway. How to protect DES against exhaustive key search. Journal of Cryptology, 14(1):17–35, 2001. Earlier version in CRYPTO’ 96.
5. R. Merkle. One way hash functions and DES. In G. Brassard, editor, Advances in Cryptology — CRYPTO’ 89, volume 435 of Lecture Notes in Computer Science. Springer-Verlag, 1990.
Cited by
180 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Quantum Collision Resistance of Double-Block-Length Hashing;IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences;2024-09-01
2. Recursion over Public-Coin Interactive Proof Systems; Faster Hash Verification;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
3. SAT Reduces to the Minimum Circuit Size Problem with a Random Oracle;2023 IEEE 64th Annual Symposium on Foundations of Computer Science (FOCS);2023-11-06
4. Quantum rebound attacks on reduced‐round ARIA‐based hash functions;ETRI Journal;2023-03-08
5. Poseidon2: A Faster Version of the Poseidon Hash Function;Progress in Cryptology - AFRICACRYPT 2023;2023