Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Cryptographic hash function
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Sources === {{refbegin}} * {{cite book|last1=Harnik|first1=Danny|last2=Kilian|first2=Joe|last3=Naor|first3=Moni|last4=Reingold |first4=Omer|last5=Rosen|first5=Alon|title=Advances in Cryptology β EUROCRYPT 2005|chapter=On Robust Combiners for Oblivious Transfer and Other Primitives|series=Lecture Notes in Computer Science|volume=3494 |year=2005|pages=96β113|issn=0302-9743|doi=10.1007/11426639_6|isbn=978-3-540-25910-7}} * {{cite book|last1=Hoch|first1=Jonathan J.|last2=Shamir|first2=Adi|chapter=On the Strength of the Concatenated Hash Combiner when All the Hash Functions Are Weak |title=Automata, Languages and Programming |series=Lecture Notes in Computer Science|volume=5126|year=2008|pages=616β630|issn=0302-9743 |doi=10.1007/978-3-540-70583-3_50|isbn=978-3-540-70582-6}} * {{cite book|last1=Joux|first1=Antoine|author-link=Antoine Joux|year=2004|chapter=Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions|title=Advances in Cryptology β CRYPTO 2004 |series=Lecture Notes in Computer Science|volume=3152|pages=306β316|place=Berlin, Heidelberg |publisher=Springer Berlin Heidelberg|issn=0302-9743|doi=10.1007/978-3-540-28628-8_19|isbn=978-3-540-22668-0|doi-access=free}} * {{cite book|last1=Kelsey|first1=John|last2=Schneier|first2=Bruce|title=Advances in Cryptology β EUROCRYPT 2005|chapter=Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work|series=Lecture Notes in Computer Science|volume=3494|year=2005|pages=474β490|issn=0302-9743|doi=10.1007/11426639_28|isbn=978-3-540-25910-7|chapter-url=https://eprint.iacr.org/2004/304|doi-access=free|access-date=2017-07-18|archive-date=2017-03-16|archive-url=https://web.archive.org/web/20170316031946/http://eprint.iacr.org/2004/304|url-status=live}} * {{cite book|last1=Katz|first1=Jonathan|last2=Lindell|first2=Yehuda|title=Introduction to Modern Cryptography|url=https://books.google.com/books?id=OWZYBQAAQBAJ&pg=PA155|year=2014|publisher=CRC Press|edition=2nd|isbn=978-1-4665-7026-9}} * {{cite book|last1=Lyubashevsky|first1=Vadim|last2=Micciancio|first2=Daniele|last3=Peikert|first3=Chris |last4=Rosen|first4=Alon|title=Fast Software Encryption|chapter=SWIFFT: A Modest Proposal for FFT Hashing |series=Lecture Notes in Computer Science|volume=5086|year=2008|pages=54β72|issn=0302-9743|doi=10.1007/978-3-540-71039-4_4|isbn=978-3-540-71038-7|doi-access=free}} * {{cite book|last1=Mendel|first1=Florian|last2=Rechberger|first2=Christian|last3=SchlΓ€ffer|first3=Martin |chapter=MD5 is Weaker Than Weak: Attacks on Concatenated Combiners |title=Advances in Cryptology β ASIACRYPT 2009|series=Lecture Notes in Computer Science|volume=5912|year=2009|pages=144β161|issn=0302-9743 |doi=10.1007/978-3-642-10366-7_9|isbn=978-3-642-10365-0|doi-access=free}} * {{cite book|last1=Nandi|first1=Mridul|last2=Paul|first2=Souradyuti|chapter=Speeding up the Wide-Pipe: Secure and Fast Hashing|title=Progress in Cryptology - INDOCRYPT 2010|series=Lecture Notes in Computer Science|volume=6498|year=2010|pages=144β162|issn=0302-9743|doi=10.1007/978-3-642-17401-8_12|isbn=978-3-642-17400-1|chapter-url=https://lirias.kuleuven.be/handle/123456789/318700}} * {{cite book |last1=Rogaway |first1=P. |last2=Shrimpton |first2=T. |chapter=Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance |chapter-url={{GBurl|c4P4OYcy99kC|p=371}} |editor1-last=Roy |editor1-first=B. |editor2-last=Mier |editor2-first=W. |title=Fast Software Encryption: 11th International Workshop, FSE 2004 |publisher=Springer |location=Lecture Notes in Computer Science |volume=3017 |date=2004 |isbn=3-540-22171-9 |pages=371β388 |url=https://books.google.com/books?id=c4P4OYcy99kC&pg=PA371 |access-date=2022-11-30 |archive-date=2022-11-30 |archive-url=https://web.archive.org/web/20221130071706/https://books.google.com/books?id=c4P4OYcy99kC&pg=PA371 |url-status=live |doi=10.1007/978-3-540-25937-4_24 |doi-access=free }} {{refend}} * {{cite book | first1 = Alfred J. | last1 = Menezes | first2 = Paul C. | last2 = van Oorschot | first3 = Scott A. | last3 = Vanstone | date = 7 December 2018 | title = Handbook of Applied Cryptography | publisher = CRC Press | pages = 33β | isbn = 978-0-429-88132-9 | chapter = Hash functions | chapter-url = https://books.google.com/books?id=YyCyDwAAQBAJ&pg=PA33}} * {{cite book | first1 = Jean-Philippe | last1 = Aumasson | date = 6 November 2017 | title = Serious Cryptography: A Practical Introduction to Modern Encryption | publisher = No Starch Press | pages = | isbn = 978-1-59327-826-7 | oclc = 1012843116 | url = https://books.google.com/books?id=W1v6DwAAQBAJ}}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)