共 50 条
- [1] Proposals for iterated hash functions SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 246 - +
- [2] Variants of Multicollision Attacks on Iterated Hash Functions INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 139 - +
- [4] Second preimages for iterated hash functions and their implications on MACs INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 68 - +
- [5] Combinatorial multicollision attacks on generalized iterated hash functions Conferences in Research and Practice in Information Technology Series, 2010, 105 : 86 - 93
- [6] Multicollisions in iterated hash functions. Application to cascaded constructions ADVANCS IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 306 - 316
- [7] One-way hash functions based on iterated chaotic systems 2007 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1 AND 2: VOL 1: COMMUNICATION THEORY AND SYSTEMS; VOL 2: SIGNAL PROCESSING, COMPUTATIONAL INTELLIGENCE, CIRCUITS AND SYSTEMS, 2007, : 1070 - +
- [8] Quantum Security of Hash Functions and Property-Preservation of Iterated Hashing POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2019, 2019, 11505 : 329 - 349
- [10] Breaking the ICE - Finding multicollisions in iterated concatenated and expanded (ICE) hash functions FAST SOFTWARE ENCRYPTION, 2006, 4047 : 179 - 194