AbstractWe study the problem of securely extending the domain of a collision resistant compression function. A new construction based on directed acyclic graphs is described. This generalizes the usual iterated hashing constructions. Our main contribution is to introduce a new technique for hashing arbitrary length strings. Combined with DAG-based hashing, this technique yields a new hashing algorithm. The amount of padding and the number of invocations of the compression function required by the new algorithm is smaller than the general Merkle–Damgård algorithm
We propose constructing provable collision resistant hash functions from expander graphs. As example...
Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to e...
Part 1: The International Cross Domain Conference (CD-ARES 2016)International audienceA cryptographi...
AbstractWe study the problem of securely extending the domain of a collision resistant compression f...
Hash functions are an invaluable tool for cryptography. They must primarily satisfy collision resist...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
Abstract. We propose constructing provable collision resistant hash functions from expander graphs. ...
This paper considers iterated hash functions. It proposes new constructions of fast and secure compr...
We propose constructing provable collision resistant hash functions from expander graphs. As example...
Abstract—This paper considers iterated hash functions. It pro-poses new constructions of fast and se...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
We propose constructing provable collision resistant hash functions from expander graphs in which fi...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
We propose constructing provable collision resistant hash functions from expander graphs. As example...
Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to e...
Part 1: The International Cross Domain Conference (CD-ARES 2016)International audienceA cryptographi...
AbstractWe study the problem of securely extending the domain of a collision resistant compression f...
Hash functions are an invaluable tool for cryptography. They must primarily satisfy collision resist...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
Abstract. We propose constructing provable collision resistant hash functions from expander graphs. ...
This paper considers iterated hash functions. It proposes new constructions of fast and secure compr...
We propose constructing provable collision resistant hash functions from expander graphs. As example...
Abstract—This paper considers iterated hash functions. It pro-poses new constructions of fast and se...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
We propose constructing provable collision resistant hash functions from expander graphs in which fi...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
We propose constructing provable collision resistant hash functions from expander graphs. As example...
Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to e...
Part 1: The International Cross Domain Conference (CD-ARES 2016)International audienceA cryptographi...