In the last years, a number of serious flaws and vulnerabilities have been found in classic cryptographic hash functions such as MD4 and MD5. More recently, similar attacks have been extended to the widely used SHA-1, to such an extent that nowadays is prudent to switch to schemes such as SHA-256 and Whirlpool. Nevertheless, many cryptographers believe that all the SHA-related schemes could be vulnerable to variants of the same attacks, for all these schemes have been largely influenced by the design of the MD4 hash function. In this paper, we present a general framework for the automated design of cryptographic block ciphers and hash functions by using Genetic Programming. After a characterization of the search space and the fitness functi...
Abstract. This paper considers hash functions based on block ciphers. It presents a new attack on th...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
© Springer-Verlag Berlin Heidelberg 1994. Constructions for hash functions baaed on a block cipher a...
peer reviewedCryptographic hash functions are fundamental primitives in modern cryptography and have...
In this paper, we present a general framework for the automated design of cryptographic block cipher...
A new cryptographic hash function Whirlwind is presented. We give the full specification and explain...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Proceding of: 9th International Conference, Reykjavik, Iceland, September 9-13, 2006.The design of n...
Proceedings of the 8th annual conference on Genetic and evolutionary computation. Seattle, Washingto...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
Abstract. 1This paper presents a new hash function design, which is different from the popular desig...
One-way hash functions play an important role in modern cryptography. Matu-siewicz et al. proved tha...
This paper considers hash functions based on block ciphers. It presents a new attack on the compress...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
In recent years there have been a series of serious and alarming cryptanalytic attacks on several co...
Abstract. This paper considers hash functions based on block ciphers. It presents a new attack on th...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
© Springer-Verlag Berlin Heidelberg 1994. Constructions for hash functions baaed on a block cipher a...
peer reviewedCryptographic hash functions are fundamental primitives in modern cryptography and have...
In this paper, we present a general framework for the automated design of cryptographic block cipher...
A new cryptographic hash function Whirlwind is presented. We give the full specification and explain...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Proceding of: 9th International Conference, Reykjavik, Iceland, September 9-13, 2006.The design of n...
Proceedings of the 8th annual conference on Genetic and evolutionary computation. Seattle, Washingto...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
Abstract. 1This paper presents a new hash function design, which is different from the popular desig...
One-way hash functions play an important role in modern cryptography. Matu-siewicz et al. proved tha...
This paper considers hash functions based on block ciphers. It presents a new attack on the compress...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
In recent years there have been a series of serious and alarming cryptanalytic attacks on several co...
Abstract. This paper considers hash functions based on block ciphers. It presents a new attack on th...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
© Springer-Verlag Berlin Heidelberg 1994. Constructions for hash functions baaed on a block cipher a...