A simple new technique of parallelizing methods for solving search problems which seek collisions in pseudorandom walks is presented. This technique can be adapted to a wide range of cryptanalytic problems which can be reduced to finding collisions. General constructions are given showing how to adapt the technique to finding discrete logarithms in cyclic groups, finding meaningful collisions in hash functions, and performing meet-in-the-middle attacks such as a known-plaintext attack on double encryption. The new technique greatly extends the reach of practical attacks, providing the most cost-effective means known to date for defeating: the small subgroup used in certain schemes based on discrete logarithms such as Schnorr, DSA, and ellip...
Most of today’s cryptographic primitives are based on computations that are hard to perform for a po...
International audienceThe cryptographic community has widely acknowledged that the emergence of larg...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
Abstract. A simple new technique of parallelizing methods for solving search problems which seek col...
Current techniques for collision search with feasible memory requirements involve pseudo-random walk...
Parallel versions of collision search algorithms require a significant amount of memory to store a p...
International audienceParallel versions of collision search algorithms require a significant amount ...
International audienceIn this paper, we investigate the multi-user setting both in public and in sec...
Abstract. In this paper, we investigate the multi-user setting both in public and in secret-key cryp...
Meet-in-the-middle attacks, where problems and the secrets being sought are decomposed into two piec...
In this note, we report several solutions to the STARK-Friendly Hash Challenge: a competition with t...
Hash functions play an important role in various cryptographic applications. Modern cryptography rel...
In this paper we show that a large class of diverse problems have a bicomposite structure which make...
We describe a new tool for the search of collisions for hash functions. The tool is applicable when ...
In this paper we introduce a new idea of tunneling of hash functions. In some sense tunnels replace ...
Most of today’s cryptographic primitives are based on computations that are hard to perform for a po...
International audienceThe cryptographic community has widely acknowledged that the emergence of larg...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
Abstract. A simple new technique of parallelizing methods for solving search problems which seek col...
Current techniques for collision search with feasible memory requirements involve pseudo-random walk...
Parallel versions of collision search algorithms require a significant amount of memory to store a p...
International audienceParallel versions of collision search algorithms require a significant amount ...
International audienceIn this paper, we investigate the multi-user setting both in public and in sec...
Abstract. In this paper, we investigate the multi-user setting both in public and in secret-key cryp...
Meet-in-the-middle attacks, where problems and the secrets being sought are decomposed into two piec...
In this note, we report several solutions to the STARK-Friendly Hash Challenge: a competition with t...
Hash functions play an important role in various cryptographic applications. Modern cryptography rel...
In this paper we show that a large class of diverse problems have a bicomposite structure which make...
We describe a new tool for the search of collisions for hash functions. The tool is applicable when ...
In this paper we introduce a new idea of tunneling of hash functions. In some sense tunnels replace ...
Most of today’s cryptographic primitives are based on computations that are hard to perform for a po...
International audienceThe cryptographic community has widely acknowledged that the emergence of larg...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...