Foiling Birthday Attacks in Length-Doubling Transformations
- 1 January 1996
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 307-320
- https://doi.org/10.1007/3-540-68339-9_27
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Cryptanalysis of MD4Lecture Notes in Computer Science, 1996
- Parallel collision search with application to hash functions and discrete logarithmsPublished by Association for Computing Machinery (ACM) ,1994
- Differential Cryptanalysis of the Data Encryption StandardPublished by Springer Science and Business Media LLC ,1993
- A fast software one-way hash functionJournal of Cryptology, 1990
- Pseudo-random generation from one-way functionsPublished by Association for Computing Machinery (ACM) ,1989
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986
- How to Generate Cryptographically Strong Sequences of Pseudorandom BitsSIAM Journal on Computing, 1984
- Theory and application of trapdoor functionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- The Wire-Tap ChannelBell System Technical Journal, 1975