Abstract. We illustrate how coding theory was applied in the design of the cryp-tographic hash function LANE [8]. The generic structure of the LANE compression function could potentially be vulnerable to a class of meet-in-the-middle attacks. While difficult to avoid at first sight, restating the problem in the domain of error correcting codes naturally leads to a simple and elegant solution. This ensures that these attacks do not apply to LANE
© Springer-Verlag Berlin Heidelberg 1994. Dedicated hash functions are cryptographically secure comp...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
Abstract. Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in whic...
Int Assoc Cryptol ResThe LANE4 hash function is designed by Sebastiaan In-desteege and Bart Preneel....
Quick proofs are given for the characterization (due to Schay, Raver, Hanan, and Palermo) of the col...
This paper considers iterated hash functions. It proposes new constructions of fast and secure compr...
In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function L...
Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in which a linear...
We propose the cryptographic hash function Lane as a candidate for the SHA-3 competition organised b...
© 2015, Springer Science+Business Media New York. A cryptographic hash function compresses arbitrari...
Abstract. This paper reconsiders the established Merkle-Damg˚ard design principle for iterated hash ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
Abstract—This paper considers iterated hash functions. It pro-poses new constructions of fast and se...
Knudsen and Preneel (Asiacrypt'96 and Crypto'97) introduced a hash function design in which a linear...
© Springer-Verlag Berlin Heidelberg 1994. Dedicated hash functions are cryptographically secure comp...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
Abstract. Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in whic...
Int Assoc Cryptol ResThe LANE4 hash function is designed by Sebastiaan In-desteege and Bart Preneel....
Quick proofs are given for the characterization (due to Schay, Raver, Hanan, and Palermo) of the col...
This paper considers iterated hash functions. It proposes new constructions of fast and secure compr...
In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function L...
Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in which a linear...
We propose the cryptographic hash function Lane as a candidate for the SHA-3 competition organised b...
© 2015, Springer Science+Business Media New York. A cryptographic hash function compresses arbitrari...
Abstract. This paper reconsiders the established Merkle-Damg˚ard design principle for iterated hash ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
Abstract—This paper considers iterated hash functions. It pro-poses new constructions of fast and se...
Knudsen and Preneel (Asiacrypt'96 and Crypto'97) introduced a hash function design in which a linear...
© Springer-Verlag Berlin Heidelberg 1994. Dedicated hash functions are cryptographically secure comp...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
Abstract. Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in whic...