www.cryptoplexity.de arno.mittelbach @ cased.de Abstract. A combiner for collision-resistant hash functions takes two functions as input and imple-ments a hash function with the guarantee that it is collision-resistant if one of the functions is. It has been shown that such a combiner cannot have short output (Pietrzak, Crypto 2008); that is, its output length is lower bounded by roughly 2n if the ingoing functions output n-bit hash values. In this paper, we present two novel definitions for hash function combiners that allow to bypass the lower bound: the first is an extended semi-black-box definition. The second is a new game-based, fully black-box definition which allows to better analyze combiners in idealized settings such as the rando...
Abstract. In this paper, we introduce new hash function design principles with variable output lengt...
This paper determines an exact relationship between collision-free hash functions and other cryptogr...
© 2015, Springer-Verlag Berlin Heidelberg. A well-established method of constructing hash functions...
Abstract. A robust combiner for hash functions takes two candidate implemen-tations and constructs a...
A hash function is an algorithm that compresses messages of arbitrary length into short digests of f...
© Springer International Publishing Switzerland 2014. A combiner is a construction formed out of two...
htmlabstractA black-box combiner for collision resistant hash functions (CRHF) is a construction w...
A $(k,l)$ hash-function combiner for property $P$ is a construction that, given access to $l$ hash f...
Suppose we have two hash functions h1 and h2, but we trust the security of only one of them. To miti...
Abstract. In this article, it is discussed how to construct a compres-sion function with 2n-bit outp...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
Abstract. There is a foundational problem involving collision-resistant hash-functions: common const...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Abstract. In this paper, we introduce new hash function design principles with variable output lengt...
This paper determines an exact relationship between collision-free hash functions and other cryptogr...
© 2015, Springer-Verlag Berlin Heidelberg. A well-established method of constructing hash functions...
Abstract. A robust combiner for hash functions takes two candidate implemen-tations and constructs a...
A hash function is an algorithm that compresses messages of arbitrary length into short digests of f...
© Springer International Publishing Switzerland 2014. A combiner is a construction formed out of two...
htmlabstractA black-box combiner for collision resistant hash functions (CRHF) is a construction w...
A $(k,l)$ hash-function combiner for property $P$ is a construction that, given access to $l$ hash f...
Suppose we have two hash functions h1 and h2, but we trust the security of only one of them. To miti...
Abstract. In this article, it is discussed how to construct a compres-sion function with 2n-bit outp...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
Abstract. There is a foundational problem involving collision-resistant hash-functions: common const...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Abstract. In this paper, we introduce new hash function design principles with variable output lengt...
This paper determines an exact relationship between collision-free hash functions and other cryptogr...
© 2015, Springer-Verlag Berlin Heidelberg. A well-established method of constructing hash functions...