Tuomas Kortelainen

According to our database1, Tuomas Kortelainen authored at least 8 papers between 2010 and 2014.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
On iteration-based security flaws in modern hash functions.
PhD thesis, 2014

New Second Preimage Attack Variants against the MD-Structure.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Unavoidable regularities in long words with bounded number of symbol occurrences.
J. Comb. Optim., 2013

On Diamond Structures and Trojan Message Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013

2012
Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks.
Proceedings of the Progress in Cryptology, 2012

2010
Multicollision attacks and generalized iterated hash functions.
J. Math. Cryptol., 2010

Variants of Multicollision Attacks on Iterated Hash Functions.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Combinatorial Multicollision Attacks on Generalized Iterated Hash Functions.
Proceedings of the 8th Australasian Information Security Conference 2010, 2010


  Loading...