1![An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1 An earlier version of this paper appeared in EurocryptSecurity/Efficiency Tradeoffs for Permutation-Based Hashing Phillip Rogaway1 and John Steinberger2 1](https://www.pdfsearch.io/img/be1550066b94900947cbfee00e78c656.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2008-05-26 20:18:15
|
---|
2![Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2 Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers Phillip Rogaway1 and John Steinberger2 1 2](https://www.pdfsearch.io/img/0900e8803134a1d1e9bcade44b62994d.jpg) | Add to Reading ListSource URL: web.cs.ucdavis.eduLanguage: English - Date: 2008-07-20 11:55:06
|
---|
3![Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland Hash Function Requirements for Schnorr Signatures Gregory Neven1,2 , Nigel P. Smart3 , and Bogdan Warinschi3 1 IBM Research – Zurich, Switzerland](https://www.pdfsearch.io/img/de2263f8c7489ca31d6860349d5dfe7d.jpg) | Add to Reading ListSource URL: www.neven.orgLanguage: English - Date: 2012-04-18 06:08:49
|
---|
4![Chapter 6 Hash Functions A hash function usually means a function that compresses, meaning the output is shorter than the input. Often, such a function takes an input of arbitrary or almost arbitrary length to one whose Chapter 6 Hash Functions A hash function usually means a function that compresses, meaning the output is shorter than the input. Often, such a function takes an input of arbitrary or almost arbitrary length to one whose](https://www.pdfsearch.io/img/4d08c4450b60e81a6cc79ce022f8d11d.jpg) | Add to Reading ListSource URL: cseweb.ucsd.eduLanguage: English - Date: 2009-09-20 23:24:55
|
---|
5![Generic collision attacks on narrow-pipe hash functions faster than birthday paradox, applicable to MDx, SHA-1, SHA-2, and SHA-3 narrow-pipe candidates Vlastimil Klima1 and Danilo Gligoroski2 1 Generic collision attacks on narrow-pipe hash functions faster than birthday paradox, applicable to MDx, SHA-1, SHA-2, and SHA-3 narrow-pipe candidates Vlastimil Klima1 and Danilo Gligoroski2 1](https://www.pdfsearch.io/img/bfae121e01677c329eb28f0319597ecd.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-08-04 14:03:01
|
---|
6![On Corrective Patterns for the SHA-2 Family Philip Hawkes1 , Michael Paddon1 , and Gregory G. Rose1 Qualcomm Australia, Level 3, 230 Victoria Rd, Gladesville, NSW 2111, Australia {phawkes,mwp,ggr}@qualcomm.com Abstract. On Corrective Patterns for the SHA-2 Family Philip Hawkes1 , Michael Paddon1 , and Gregory G. Rose1 Qualcomm Australia, Level 3, 230 Victoria Rd, Gladesville, NSW 2111, Australia {phawkes,mwp,ggr}@qualcomm.com Abstract.](https://www.pdfsearch.io/img/0548a0a4ca83df1e26e8d7c380834c28.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2004-08-22 14:38:17
|
---|
7![Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012 Cryptanalysis on a Merkle-Damgård Based MAC Almost Universal Forgery and Distinguishing-H Attacks Yu Sasaki (NTT Corporation[removed] @ Eurocrypt 2012](https://www.pdfsearch.io/img/9e5cb2d25c5cf3d1aa106c96ae03a351.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2012-04-20 07:04:20
|
---|
8![FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose FSE[removed]17, Graz) Some Plausible Constructions of Double-Block-Length Hash Functions Shoichi Hirose](https://www.pdfsearch.io/img/669ea396f6af84eec832f6db546dfe7e.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2006-04-18 10:40:57
|
---|
9![Multicollision Attacks on Some Generalized Sequential Hash Functions Multicollision Attacks on Some Generalized Sequential Hash Functions](https://www.pdfsearch.io/img/1da0df5e344c41b204d8c8023f494fa5.jpg) | Add to Reading ListSource URL: csrc.nist.govLanguage: English - Date: 2012-06-20 09:57:26
|
---|