Cryptographic hash functions are efficiently computable functions that shrink a long input into a shorter output while achieving some of the useful security properties of a random function. The most common type of such hash functions is collision resistant hash functions (CRH), which prevent an efficient attacker from finding a pair of inputs on which the function has the same output
Hash functions are an invaluable tool for cryptography. They must primarily satisfy collision resist...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
The Learning Parity with Noise (LPN) problem has recently found many cryptographic applications such...
htmlabstractA black-box combiner for collision resistant hash functions (CRHF) is a construction w...
Abstract. There is a foundational problem involving collision-resistant hash-functions: common const...
In Eurocrypt 2006, Contini, Lenstra, and Steinfeld proposed a new hash function primitive, VSH, very...
Non-cryptographic hash functions (NCHFs) have an immense number of applications, ranging from compil...
A cryptographic hash work is a phenomenal class of hash work that has certain properties which make ...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Hash functions are considered key components of nearly all cryptographic protocols, as well as of ma...
Item removed from eCommons on 2010-02-21 at the request of the author.A long-standing open problem o...
At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash fu...
In this thesis we study the security of a number of dedicated cryptographic hash functions against c...
Abstract. At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For...
Hash functions are an invaluable tool for cryptography. They must primarily satisfy collision resist...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
The Learning Parity with Noise (LPN) problem has recently found many cryptographic applications such...
htmlabstractA black-box combiner for collision resistant hash functions (CRHF) is a construction w...
Abstract. There is a foundational problem involving collision-resistant hash-functions: common const...
In Eurocrypt 2006, Contini, Lenstra, and Steinfeld proposed a new hash function primitive, VSH, very...
Non-cryptographic hash functions (NCHFs) have an immense number of applications, ranging from compil...
A cryptographic hash work is a phenomenal class of hash work that has certain properties which make ...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Hash functions are considered key components of nearly all cryptographic protocols, as well as of ma...
Item removed from eCommons on 2010-02-21 at the request of the author.A long-standing open problem o...
At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash fu...
In this thesis we study the security of a number of dedicated cryptographic hash functions against c...
Abstract. At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For...
Hash functions are an invaluable tool for cryptography. They must primarily satisfy collision resist...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...