×

Found 5 Documents (Results 1–5)

On the strength of the concatenated hash combiner when all the hash functions are weak. (English) Zbl 1155.94372

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 616-630 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Second preimage attacks on dithered hash functions. (English) Zbl 1149.94302

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 270-288 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Breaking the ICE – finding multicollisions in iterated concatenated and expanded (ICE) hash functions. (English) Zbl 1234.94047

Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 179-194 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fault analysis of stream ciphers. (English) Zbl 1104.68479

Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 240-253 (2004).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Year of Publication

Main Field

Software