Birthday attack
Top View
- Limited-Birthday Distinguishers for Hash Functions Collisions Beyond the Birthday Bound Can Be Meaningful
- CSE 291-I: Applied Cryptography
- Contributions to Cryptanalysis: Design and Analysis of Cryptographic Hash Functions
- Cryptography Primer
- Revisiting AES-GCM-SIV: Multi-User Security, Faster Key Derivation, and Better Bounds
- Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
- New Birthday Attacks on Some Macs Based on Block Ciphers
- Cryptographic Hash Functions Lecture Outline
- A GSM Stream Cipher
- Hash Functions: Theory, Attacks, and Applications
- Impact of Hash Function Non-Uniformity on Digital Signature Security1
- Hash Function Balance and Its Impact on Birthday Attacks
- EXPLORING the BIRTHDAY ATTACK / PARADOX1 : a Powerful Vehicle Underlying Information Security
- Revisiting Variable Output Length XOR Pseudorandom Function
- Cryptographic Hash Functions
- The JAMBU Lightweight Authentication Encryption Mode (V2)
- Status Report on the Second Round of the NIST Lightweight Cryptography Standardization Process
- New Features of Latin Dances: Analysis of Salsa, Chacha, and Rumba⋆