This paper describes a second preimage attack on the CubeHash cryp-tographic one-way hash function. The attack finds a second preimage in less time than brute force search for these CubeHash variants: CubeHash r/b-224 for b> 100; CubeHashr/b-256 for b> 96; CubeHashr/b-384 for b> 80; and CubeHashr/b-512 for b> 64. However, the attack does not break the CubeHash variants recommended for SHA-3. The attack requires minimal memory and can be performed in a massively parallel fashion. This paper also describes several statistical randomness tests on CubeHash. The tests were unable to disprove the hypothesis that Cube-Hash behaves as a random mapping. These results support CubeHash’s viability as a secure cryptographic hash function.
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
Hash functions are considered key components of nearly all cryptographic protocols, as well as of ma...
This paper describes a second preimage attack on the CubeHash cryptographic one-way hash function. T...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Abstract. Recent developments in the field of cryptanalysis of hash func-tions has inspired NIST to ...
This work analyzes the statistical properties of the SHA-3 candidate cryptographic hash algorithms C...
Abstract. The recently started SHA-3 competition in order to find a new secure hash standard and thu...
TCS\_SHA-3 is a family of four cryptographic hash functions that are covered by an US patent (US 200...
Abstract. In this paper, we describe a variant of the cube attack with much better-understood Prepro...
Abstract. This paper presents improved collision attacks on round-reduced variants of the hash funct...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
International audienceIn this paper, we comprehensively study the resistance of keyed variants of SH...
In this short note we give an observation about the SHA- 3 candidate Keccak[r,c,d], where the parame...
Abstract. In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak)...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
Hash functions are considered key components of nearly all cryptographic protocols, as well as of ma...
This paper describes a second preimage attack on the CubeHash cryptographic one-way hash function. T...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Abstract. Recent developments in the field of cryptanalysis of hash func-tions has inspired NIST to ...
This work analyzes the statistical properties of the SHA-3 candidate cryptographic hash algorithms C...
Abstract. The recently started SHA-3 competition in order to find a new secure hash standard and thu...
TCS\_SHA-3 is a family of four cryptographic hash functions that are covered by an US patent (US 200...
Abstract. In this paper, we describe a variant of the cube attack with much better-understood Prepro...
Abstract. This paper presents improved collision attacks on round-reduced variants of the hash funct...
In this paper, we describe a variant of the cube attack with much better-understood Preprocessing Ph...
International audienceIn this paper, we comprehensively study the resistance of keyed variants of SH...
In this short note we give an observation about the SHA- 3 candidate Keccak[r,c,d], where the parame...
Abstract. In this paper, we comprehensively study the resistance of keyed variants of SHA-3 (Keccak)...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
Hash functions are considered key components of nearly all cryptographic protocols, as well as of ma...