Abstract. We present a cryptanalysis of a provably secure cryptographic hash function proposed by Augot, Finiasz and Sendrier in [1]. Our attack is a variant of Wagner's generalized birthday attack. It is signicantly faster than the attack considered in [1], and it is practical for two of the three proposed parameters.
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the sec...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
This paper describes the study of cryptographic hash functions, one of the most important classes of...
Abstract. Recently, some collisions have been exposed for a variety of cryptographic hash functions ...
Recently, some collisions have been exposed for a variety of cryptographic hash functions including ...
At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash fu...
Recent breakthroughs concerning the current standard SHA-1 prompted NIST to launch a competition for...
We propose a family of fast and provably secure cryptographic hash functions. The security of these ...
At Eurocrypt 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash fu...
In this paper we constructed a class of double length hash functions which are maximally secure i.e...
Abstract. At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
The Zemor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
The hash function FSB is one of the candidates submitted to NIST’s competition to find the new stand...
Abstract. This paper eviews constructions of hash functions and MAC algorithms based on block cipher...
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the sec...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
This paper describes the study of cryptographic hash functions, one of the most important classes of...
Abstract. Recently, some collisions have been exposed for a variety of cryptographic hash functions ...
Recently, some collisions have been exposed for a variety of cryptographic hash functions including ...
At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash fu...
Recent breakthroughs concerning the current standard SHA-1 prompted NIST to launch a competition for...
We propose a family of fast and provably secure cryptographic hash functions. The security of these ...
At Eurocrypt 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash fu...
In this paper we constructed a class of double length hash functions which are maximally secure i.e...
Abstract. At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
The Zemor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
The hash function FSB is one of the candidates submitted to NIST’s competition to find the new stand...
Abstract. This paper eviews constructions of hash functions and MAC algorithms based on block cipher...
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the sec...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
This paper describes the study of cryptographic hash functions, one of the most important classes of...