Abstract. In this paper we study the security of summing the outputs of two independent hash functions, in an effort to increase the security of the resulting design, or to hedge against the failure of one of the hash functions. The exclusive-or (XOR) combiner H1(M)⊕H2(M) is one of the two most classical combiners, together with the concatenation combiner H1(M) ‖ H2(M). While the security of the concatenation of two hash functions is well understood since Joux’s seminal work on multicollisions, the security of the sum of two hash functions has been much less studied. The XOR combiner is well known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and 1.1. In a hash function setting, Hoch and Shamir have shown that...
We consider the family of 2n-to-n-bit compression functions that are solely based on at most three p...
We consider the generic design of compression functions based on two n-bit permutations and XOR-base...
This paper studies functional-graph-based (second) preimage attacks against hash combiners. By explo...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
International audienceIn this paper we study the security of summing the outputs of two independent ...
A hash function is an algorithm that compresses messages of arbitrary length into short digests of f...
Suppose we have two hash functions h1 and h2, but we trust the security of only one of them. To miti...
Abstract. A robust combiner for hash functions takes two candidate implemen-tations and constructs a...
International audienceHash combiners are a practical way to make cryptographic hash functions more t...
www.cryptoplexity.de arno.mittelbach @ cased.de Abstract. A combiner for collision-resistant hash fu...
A $(k,l)$ hash-function combiner for property $P$ is a construction that, given access to $l$ hash f...
© Springer International Publishing Switzerland 2014. A combiner is a construction formed out of two...
© 2015 by De Gruyter. We consider the generic design of compression functions based on two n-bit pe...
Abstract. At SAC 2006, Liskov proposed the zipper hash, a technique for constructing secure (indiffe...
htmlabstractA black-box combiner for collision resistant hash functions (CRHF) is a construction w...
We consider the family of 2n-to-n-bit compression functions that are solely based on at most three p...
We consider the generic design of compression functions based on two n-bit permutations and XOR-base...
This paper studies functional-graph-based (second) preimage attacks against hash combiners. By explo...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
International audienceIn this paper we study the security of summing the outputs of two independent ...
A hash function is an algorithm that compresses messages of arbitrary length into short digests of f...
Suppose we have two hash functions h1 and h2, but we trust the security of only one of them. To miti...
Abstract. A robust combiner for hash functions takes two candidate implemen-tations and constructs a...
International audienceHash combiners are a practical way to make cryptographic hash functions more t...
www.cryptoplexity.de arno.mittelbach @ cased.de Abstract. A combiner for collision-resistant hash fu...
A $(k,l)$ hash-function combiner for property $P$ is a construction that, given access to $l$ hash f...
© Springer International Publishing Switzerland 2014. A combiner is a construction formed out of two...
© 2015 by De Gruyter. We consider the generic design of compression functions based on two n-bit pe...
Abstract. At SAC 2006, Liskov proposed the zipper hash, a technique for constructing secure (indiffe...
htmlabstractA black-box combiner for collision resistant hash functions (CRHF) is a construction w...
We consider the family of 2n-to-n-bit compression functions that are solely based on at most three p...
We consider the generic design of compression functions based on two n-bit permutations and XOR-base...
This paper studies functional-graph-based (second) preimage attacks against hash combiners. By explo...