Author of the publication

Herding Hash Functions and the Nostradamus Attack.

, and . EUROCRYPT, volume 4004 of Lecture Notes in Computer Science, page 183-200. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants., and . AES Candidate Conference, page 169-185. National Institute of Standards and Technology,, (2000)Second Preimages on n-Bit Hash Functions for Much Less than 2n Work., and . EUROCRYPT, volume 3494 of Lecture Notes in Computer Science, page 474-490. Springer, (2005)Breaking Category Five SPHINCS+ with SHA-256., , and . PQCrypto, volume 13512 of Lecture Notes in Computer Science, page 501-522. Springer, (2022)Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator., , and . Selected Areas in Cryptography, volume 1758 of Lecture Notes in Computer Science, page 13-33. Springer, (1999)Cryptographic Support for Secure Logs on Untrusted Machines., and . USENIX Security Symposium, USENIX Association, (1998)Design Principles for True Random Number Generators for Security Applications., , , , and . DAC, page 121. ACM, (2019)Authenticating Secure Tokens Using Slow Memory Access., and . Smartcard, USENIX Association, (1999)Automatic Event-Stream Notarization Using Digital Signatures., and . Security Protocols Workshop, volume 1189 of Lecture Notes in Computer Science, page 155-169. Springer, (1996)Cryptanalysis of a class of cryptographic hash functions., and . IACR Cryptology ePrint Archive, (2007)The New Randomness Beacon Format Standard: An Exercise in Limiting the Power of a Trusted Third Party.. SSR, volume 11322 of Lecture Notes in Computer Science, page 164-184. Springer, (2018)