Abstract. Sarmal is a hash function submitted to the NIST SHA-3 hash function competition. The design and structure of Sarmal is quite similar to that of ARIRANG, another SHA-3 candidate. We analyse the impact and applicability of recent attacks by Guo et al. on ARIRANG, with respect to Sarmal. Our results indicate that Sarmal is less vulnerable against this line of attack; in particular we were not able to obtain pseudo-collisions for Sarmal faster than using a generic attack. However, we have found that the compression function of Sarmal can be distinguished from a pseudorandom function with probability one, using only two compression function calls. This result is specific to the compression function, and does not seem extensible to the ...
© 2015, Springer-Verlag Berlin Heidelberg. A well-established method of constructing hash functions...
HAVAL is a cryptographic hash function proposed in 1992 by Zheng, Pieprzyk and Seberry. Its structur...
Abstract. We consider the security of compression functions built by combin-ing smaller perfectly se...
Abstract. In this paper, we show a collision attack on the hash function of Sarmal with different sa...
Abstract. In this paper we analyse the security of the SHA-3 candi-date ARIRANG. We show that bitwis...
In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complemen...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
Hamsi is one of the second round candidates of the SHA-3 competition In this study, we present non-r...
Abstract. In this work, we introduce a new non-random property for hash/compression functions using ...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
This Thesis focuses on hash functions, which are used in numerous cryptographic mechanisms. We prese...
© International Association for Cryptologic Research 2015. Hash functions are often constructed base...
Abstract. The design principle of Merkle-Damg˚ard construction is collision resistance of the compre...
© 2015, Springer-Verlag Berlin Heidelberg. A well-established method of constructing hash functions...
HAVAL is a cryptographic hash function proposed in 1992 by Zheng, Pieprzyk and Seberry. Its structur...
Abstract. We consider the security of compression functions built by combin-ing smaller perfectly se...
Abstract. In this paper, we show a collision attack on the hash function of Sarmal with different sa...
Abstract. In this paper we analyse the security of the SHA-3 candi-date ARIRANG. We show that bitwis...
In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complemen...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
Hamsi is one of the second round candidates of the SHA-3 competition In this study, we present non-r...
Abstract. In this work, we introduce a new non-random property for hash/compression functions using ...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
This Thesis focuses on hash functions, which are used in numerous cryptographic mechanisms. We prese...
© International Association for Cryptologic Research 2015. Hash functions are often constructed base...
Abstract. The design principle of Merkle-Damg˚ard construction is collision resistance of the compre...
© 2015, Springer-Verlag Berlin Heidelberg. A well-established method of constructing hash functions...
HAVAL is a cryptographic hash function proposed in 1992 by Zheng, Pieprzyk and Seberry. Its structur...
Abstract. We consider the security of compression functions built by combin-ing smaller perfectly se...