Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDMA_2019_12_a29, author = {I. A. Gribanova and A. A. Semenov}, title = {On the argument of the absence of properties of a random oracle for some cryptographic hash functions}, journal = {Prikladnaya Diskretnaya Matematika. Supplement}, pages = {95--98}, publisher = {mathdoc}, number = {12}, year = {2019}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDMA_2019_12_a29/} }
TY - JOUR AU - I. A. Gribanova AU - A. A. Semenov TI - On the argument of the absence of properties of a random oracle for some cryptographic hash functions JO - Prikladnaya Diskretnaya Matematika. Supplement PY - 2019 SP - 95 EP - 98 IS - 12 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/PDMA_2019_12_a29/ LA - ru ID - PDMA_2019_12_a29 ER -
%0 Journal Article %A I. A. Gribanova %A A. A. Semenov %T On the argument of the absence of properties of a random oracle for some cryptographic hash functions %J Prikladnaya Diskretnaya Matematika. Supplement %D 2019 %P 95-98 %N 12 %I mathdoc %U http://geodesic.mathdoc.fr/item/PDMA_2019_12_a29/ %G ru %F PDMA_2019_12_a29
I. A. Gribanova; A. A. Semenov. On the argument of the absence of properties of a random oracle for some cryptographic hash functions. Prikladnaya Diskretnaya Matematika. Supplement, no. 12 (2019), pp. 95-98. http://geodesic.mathdoc.fr/item/PDMA_2019_12_a29/
[1] Bellare M., Rogaway P., “Random oracles are practical: a paradigm for designing efficient protocols”, Proc. CCS'93, ACM, N.Y., 1993, 62–73
[2] Pointcheval D., Stern J., “Security proofs for signature schemes”, EUROCRYPT'96, LNCS, 1070, 1996, 387–398 | MR | Zbl
[3] Pointcheval D., Stern J., “Security arguments for digital signatures and blind signatures”, J. Cryptology, 13:3 (2000), 361–396 | DOI | Zbl
[4] Rivest R. L., “The MD4 message digest algorithm”, CRYPTO'90, LNCS, 537, 1990, 303–311
[5] Gribanova I., Semenov A., “Using automatic generation of relaxation constraints to improve the preimage attack on 39-step MD4”, Proc. MIPRO-2018, IEEE, 2018, 1174–1179
[6] Gribanova I. A., “Novyi algoritm porozhdeniya oslablyayuschikh ogranichenii v zadache obrascheniya khesh-funktsii MD4-39”, Prikladnaya diskretnaya matematika. Prilozhenie, 2018, no. 11, 139–141
[7] Dobbertin H., “The first two rounds of MD4 are not one-way”, Proc. FSE'1998, LNCS, 1372, 1998, 284–292 | Zbl
[8] De D., Kumarasubramanian A., Venkatesan R., “Inversion attacks on secure hash functions using SAT solvers”, Proc. FSE'2007, LNCS, 4501, 2007, 377–382 | Zbl
[9] Boros E., Hammer P. L., “Pseudo-boolean optimization”, Discr. Appl. Math., 123:1–3 (2002), 155–225 | DOI | MR | Zbl
[10] Irkutskii superkompyuternyi tsentr SO RAN, http://hpc.icc.ru