Time-Space Lower Bounds for Finding Collisions in Merkle–Damgård Hash Functions (English)
- New search for: Akshima
- New search for: Guo, Siyao
- New search for: Liu, Qipeng
- New search for: Akshima
- New search for: Guo, Siyao
- New search for: Liu, Qipeng
In:
Journal of Cryptology
;
37
, 2
;
2024
- Article (Journal) / Electronic Resource
-
Title:Time-Space Lower Bounds for Finding Collisions in Merkle–Damgård Hash Functions
-
Additional title:J Cryptol
-
Contributors:
-
Published in:Journal of Cryptology ; 37, 2
-
Publisher:
- New search for: Springer US
-
Place of publication:New York
-
Publication date:2024-04-01
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 37, Issue 2
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
Hashing to Elliptic Curves Through Cipolla–Lehmer–Müller’s Square Root AlgorithmKoshelev, Dmitrii et al. | 2024
-
Time-Space Lower Bounds for Finding Collisions in Merkle–Damgård Hash FunctionsAkshima / Guo, Siyao / Liu, Qipeng et al. | 2024
-
(Continuous) Non-malleable Codes for Partial Functions with Manipulation Detection and Light UpdatesKiayias, Aggelos / Liu, Feng-Hao / Tselekounis, Yiannis et al. | 2024
-
Entropy Computation for Oscillator-based Physical Random Number GeneratorsLubicz, David / Fischer, Viktor et al. | 2024
-
Bitcoin as a Transaction Ledger: A Composable TreatmentBadertscher, Christian / Maurer, Ueli / Tschudi, Daniel / Zikas, Vassilis et al. | 2024
-
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext SettingHofheinz, Dennis / Koch, Jessica / Striecks, Christoph et al. | 2024
-
Collision Resistance from Multi-collision ResistanceRothblum, Ron D. / Vasudevan, Prashant Nalini et al. | 2024
-
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3Fischlin, Marc / Günther, Felix / Janson, Christian et al. | 2024
-
The COLM Authenticated Encryption SchemeAndreeva, Elena / Bogdanov, Andrey / Datta, Nilanjan / Luykx, Atul / Mennink, Bart / Nandi, Mridul / Tischhauser, Elmar / Yasuda, Kan et al. | 2024
-
Bandwidth-Hard Functions: Reductions and Lower BoundsBlocki, Jeremiah / Liu, Peiyuan / Ren, Ling / Zhou, Samson et al. | 2024
-
Optimizing Rectangle and Boomerang Attacks: A Unified and Generic Framework for Key RecoveryYang, Qianqian / Song, Ling / Zhang, Nana / Shi, Danping / Wang, Libo / Zhao, Jiahao / Hu, Lei / Weng, Jian et al. | 2024