Andreeva, Elena; Bouillaguet, Charles; Dunkelman, Orr; Fouque, Pierre-Alain; Hoch, Jonathan; Kelsey, John; Shamir, Adi; Zimmer, Sébastien New second-preimage attacks on hash functions. (English) Zbl 1365.94397 J. Cryptology 29, No. 4, 657-696 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Andreeva} et al., J. Cryptology 29, No. 4, 657--696 (2016; Zbl 1365.94397) Full Text: DOI HAL
Hoch, Jonathan J.; Shamir, Adi On the strength of the concatenated hash combiner when all the hash functions are weak. (English) Zbl 1155.94372 Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 616-630 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{J. J. Hoch} and \textit{A. Shamir}, Lect. Notes Comput. Sci. 5126, 616--630 (2008; Zbl 1155.94372) Full Text: DOI
Andreeva, Elena; Bouillaguet, Charles; Fouque, Pierre-Alain; Hoch, Jonathan J.; Kelsey, John; Shamir, Adi; Zimmer, Sebastien Second preimage attacks on dithered hash functions. (English) Zbl 1149.94302 Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 270-288 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Andreeva} et al., Lect. Notes Comput. Sci. 4965, 270--288 (2008; Zbl 1149.94302) Full Text: DOI
Hoch, Jonathan J.; Shamir, Adi Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. (English) Zbl 1234.94047 Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 179-194 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{J. J. Hoch} and \textit{A. Shamir}, Lect. Notes Comput. Sci. 4047, 179--194 (2006; Zbl 1234.94047) Full Text: DOI
Hoch, Jonathan J.; Shamir, Adi Fault analysis of stream ciphers. (English) Zbl 1104.68479 Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 240-253 (2004). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. J. Hoch} and \textit{A. Shamir}, Lect. Notes Comput. Sci. 3156, 240--253 (2004; Zbl 1104.68479) Full Text: DOI