Abstract. A robust combiner for hash functions takes two candidate implemen-tations and constructs a hash function which is secure as long as at least one of the candidates is secure. So far, hash function combiners only aim at preserving a single property such as collision-resistance or pseudorandomness. However, when hash functions are used in protocols like TLS they are often required to provide several properties simultaneously. We therefore put forward the notion of robust multi-property combiners and elabo-rate on different definitions for such combiners. We then propose a combiner that provably preserves (target) collision-resistance, pseudorandomness, and being a se-cure message authentication code. This combiner satisfies the stron...
© 2015, Springer-Verlag Berlin Heidelberg. A well-established method of constructing hash functions...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Abstract. In this article, it is discussed how to construct a compres-sion function with 2n-bit outp...
A hash function is an algorithm that compresses messages of arbitrary length into short digests of f...
www.cryptoplexity.de arno.mittelbach @ cased.de Abstract. A combiner for collision-resistant hash fu...
A $(k,l)$ hash-function combiner for property $P$ is a construction that, given access to $l$ hash f...
Suppose we have two hash functions h1 and h2, but we trust the security of only one of them. To miti...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
Cryptographic hash functions deterministically generate a short digest225}0s̀ummary'' of an input me...
Abstract A (1,2)-robust combiner for a cryptographic primitive P is a construction that takes twocan...
Abstract. Let A and B denote cryptographic primitives. A (k; m)-robust A-to-B combiner is a construc...
htmlabstractA black-box combiner for collision resistant hash functions (CRHF) is a construction w...
© Springer International Publishing Switzerland 2014. A combiner is a construction formed out of two...
This paper proposes a new hash construction based on the widely used Merkle-Damgård (MD) iteration [...
© 2015, Springer-Verlag Berlin Heidelberg. A well-established method of constructing hash functions...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Abstract. In this article, it is discussed how to construct a compres-sion function with 2n-bit outp...
A hash function is an algorithm that compresses messages of arbitrary length into short digests of f...
www.cryptoplexity.de arno.mittelbach @ cased.de Abstract. A combiner for collision-resistant hash fu...
A $(k,l)$ hash-function combiner for property $P$ is a construction that, given access to $l$ hash f...
Suppose we have two hash functions h1 and h2, but we trust the security of only one of them. To miti...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
Cryptographic hash functions deterministically generate a short digest225}0s̀ummary'' of an input me...
Abstract A (1,2)-robust combiner for a cryptographic primitive P is a construction that takes twocan...
Abstract. Let A and B denote cryptographic primitives. A (k; m)-robust A-to-B combiner is a construc...
htmlabstractA black-box combiner for collision resistant hash functions (CRHF) is a construction w...
© Springer International Publishing Switzerland 2014. A combiner is a construction formed out of two...
This paper proposes a new hash construction based on the widely used Merkle-Damgård (MD) iteration [...
© 2015, Springer-Verlag Berlin Heidelberg. A well-established method of constructing hash functions...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Abstract. In this article, it is discussed how to construct a compres-sion function with 2n-bit outp...