Sciweavers

3 search results - page 1 / 1
» Herding Hash Functions and the Nostradamus Attack
Sort
View
EUROCRYPT
2006
Springer
13 years 9 months ago
Herding Hash Functions and the Nostradamus Attack
In this paper, we develop a new attack on Damg
John Kelsey, Tadayoshi Kohno
EUROCRYPT
2008
Springer
13 years 7 months ago
Second Preimage Attacks on Dithered Hash Functions
Abstract. We develop a new generic long-message second preimage attack, based on combining the techniques in the second preimage attacks of Dean [8] and Kelsey and Schneier [16] wi...
Elena Andreeva, Charles Bouillaguet, Pierre-Alain ...
CRYPTO
2007
Springer
134views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
Domain Extension of Public Random Functions: Beyond the Birthday Barrier
A public random function is a random function that is accessible by all parties, including the adversary. For example, a (public) random oracle is a public random function {0, 1}â...
Ueli M. Maurer, Stefano Tessaro