In this paper we present a cryptanalysis of a new 256-bit hash function, FORK-256, proposed by Hong et al. at FSE 2006. This cryptanalysis is based on some unexpected differentials existing for the step transformation. We show their possible uses in different attack scenarios by giving a 1-bit (resp. 2-bit) near collision attack against the full compression function of FORK-256 running with complexity of 2^125 (resp. 2^120) and with negligible memory, and by exhibiting a 22-bit near pseudo-collision. We also show that we can find collisions for the full compression function with a small amount of memory with complexity not exceeding 2^126.6 hash evaluations. We further show how to reduce this complexity to 2^109.6 hash computations by using...
In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complemen...
peer reviewedWe analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 200...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
In this paper we present a cryptanalysis of a new 256-bit hash function, FORK-256, proposed by Hong ...
Abstract. This report presents analysis of the compression function of a recently proposed hash func...
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions f...
© Springer-Verlag Berlin Heidelberg 2007. FORK-256 is a hash function presented at FSE 2006. Whereas...
Cryptographic hash functions serve as a fundamental building block of information security and are u...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen [5] as candidates for the SHA-3 c...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson...
International audienceECHO-256 is a second-round candidate of the SHA-3 competition. It is an AES-ba...
Abstract. The Hash function Skein is one of the 5 finalists of NIST SHA-3 competition. It is designe...
In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complemen...
peer reviewedWe analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 200...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...
In this paper we present a cryptanalysis of a new 256-bit hash function, FORK-256, proposed by Hong ...
Abstract. This report presents analysis of the compression function of a recently proposed hash func...
In a paper published in FSE 2007, a way of obtaining near-collisions and in theory also collisions f...
© Springer-Verlag Berlin Heidelberg 2007. FORK-256 is a hash function presented at FSE 2006. Whereas...
Cryptographic hash functions serve as a fundamental building block of information security and are u...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
The EnRUPT hash functions were proposed by O'Neil, Nohl and Henzen [5] as candidates for the SHA-3 c...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson...
International audienceECHO-256 is a second-round candidate of the SHA-3 competition. It is an AES-ba...
Abstract. The Hash function Skein is one of the 5 finalists of NIST SHA-3 competition. It is designe...
In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complemen...
peer reviewedWe analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 200...
Abstract. In this paper, we focus on the construction of semi-free-start collisions for SHA-256, and...