Program pracovní konference NIST k hašovacím funkcím
24.08.2006
P?ísp?vky:
A Framework for Iterative Hash Functions --- HAIFA
How to Construct Double-Block-Length Hash Functions
Multi-Property-Preserving Hash Domain Extension: The EMD Transform
Classification of Hash Functions Suitable for Real-life Systems
Update on Randomized Hashing
Message Modification, Neutral Bits and Boomerangs:
From Which Round Should we Start Counting in SHA?
RadioGatun, a Belt-and-Mill Hash Function
LASH
Finding SHA-1 Characteristics
Automated Search for Round 1 Differentials for SHA-1: Work in
Progress
Precise Probabilities for Hash Collision Paths
Gröbner Basis Based Cryptanalysis of SHA-1
Edon-R Family of Cryptographic Hash Functions
Cryptographic Hash Functions from Expander Graphs
Provably Secure FFT Hashing
Forgery and Partial Key Recovery Attacks on HMAC and NMAC using Hash Collisions
Development Timeline of the New Hash Function Standard