Abstract. This work is motivated by future developments of mass mar-kets, where cryptographic infrastructures will become more and more important. One core component of such an infrastructure is a secure cryptographic hash function, which is used for a lot of applications like challenge-response authentication systems or digital signature schemes. Low budget impelementations of such components are therefore very important. In particular, the National Institute of Standards and Technology (NIST) has started a competition for a new secure hash algorithm (SHA-3). New hash functions should outperform older hash functions and thus we study the performance of some of the candidates. A significant comparison between the submitted candidates is onl...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
Abstract. In this note, an observation is made regarding the Skein hash function [1] which has been ...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
has started a competition for a new secure hash standard. To make a significant comparison between t...
The National Institute of Standards and Technology (NIST) has started a competition for a new secure...
Cryptographic hash functions map input strings of arbitrary length to fixed length output strings. T...
In 2007, the US National Institute for Standards and Technology announced a call for the design of a...
Skein is a new family of cryptographic hash functions. Its design combines speed, security, simplic-...
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression functio...
The competition of the NIST contenders in SHA-3 increased between the candidates hash functions to c...
The National Institute of Standard and Technology (NIST) has suggested different principles for hash...
The pervasive diffusion of electronic devices in security and privacy sensitive applications has boo...
The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerge...
Cryptographic hash functions play an important role in the security of many applications such as dig...
With the large scale proliferation of networked devices ranging from medical implants like pacemaker...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
Abstract. In this note, an observation is made regarding the Skein hash function [1] which has been ...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
has started a competition for a new secure hash standard. To make a significant comparison between t...
The National Institute of Standards and Technology (NIST) has started a competition for a new secure...
Cryptographic hash functions map input strings of arbitrary length to fixed length output strings. T...
In 2007, the US National Institute for Standards and Technology announced a call for the design of a...
Skein is a new family of cryptographic hash functions. Its design combines speed, security, simplic-...
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression functio...
The competition of the NIST contenders in SHA-3 increased between the candidates hash functions to c...
The National Institute of Standard and Technology (NIST) has suggested different principles for hash...
The pervasive diffusion of electronic devices in security and privacy sensitive applications has boo...
The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerge...
Cryptographic hash functions play an important role in the security of many applications such as dig...
With the large scale proliferation of networked devices ranging from medical implants like pacemaker...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
Abstract. In this note, an observation is made regarding the Skein hash function [1] which has been ...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...