Int Assoc Cryptol ResThe LANE4 hash function is designed by Sebastiaan In-desteege and Bart Preneel. It is now a first round candidate of NISTs SHA-3 competition. The LANE hash function contains four concrete designs with different digest length of 224, 256, 384 and 512. The LANE hash function uses two permutations P and Q, which consist of different number of AES1-like rounds. LANE-224/256 uses 6-round P and 3-round Q. LANE-384/512 uses 8-round P and 4-round Q. We will use LANE-n-(a,b) to denote a. variant of LANE with a-round P, b-round Q and a digest length n. We have found a semi-free start collision attack on reduced-round LANE-256-(3,3) with complexity of 2(62) compression function evaluations and 2(69) memory. This technique call be ...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Abstract. MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the...
In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complemen...
We propose the cryptographic hash function Lane as a candidate for the SHA-3 competition organised b...
In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function L...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Cryptographic hash functions map input strings of arbitrary length to fixed length output strings. T...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
Cryptographic hash functions play an important role in the security of many applications such as dig...
The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerge...
Abstract. The EnRUPT hash functions were proposed by O’Neil, Nohl and Henzen [5] as candidates for t...
Abstract. We illustrate how coding theory was applied in the design of the cryp-tographic hash funct...
In recent years there have been a series of serious and alarming cryptanalytic attacks on several co...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Abstract. MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the...
In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complemen...
We propose the cryptographic hash function Lane as a candidate for the SHA-3 competition organised b...
In this work, we apply the rebound attack to the AES based SHA-3 candidate Lane. The hash function L...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of th...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Cryptographic hash functions map input strings of arbitrary length to fixed length output strings. T...
The Keccak sponge function family, designed by Bertoni et al. in 2007, was selected by the U.S. Nati...
Cryptographic hash functions play an important role in the security of many applications such as dig...
The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerge...
Abstract. The EnRUPT hash functions were proposed by O’Neil, Nohl and Henzen [5] as candidates for t...
Abstract. We illustrate how coding theory was applied in the design of the cryp-tographic hash funct...
In recent years there have been a series of serious and alarming cryptanalytic attacks on several co...
A secure cryptographic hashing function should be resistant to three different scenarios: First, a c...
Abstract. MD4 is a hash function developed by Rivest in 1990. It serves as the basis for most of the...
In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complemen...