Chosen-target-forced-prefix (CTFP) preimage resistance is a hash function security property guaranteeing the inability of an attacker to commit to a hash function outcome h without knowing the prefix of the message to be hashed in advance. At EUROCRYPT 2006, Kelsey and Kohno described the herding attack against the Merkle-Damgård design that results in a CTFP-preimage of length about n/3 blocks in approximately n·2 2n/3 compression function calls. Using an additional parameter l, the attack can be sped-up at the cost of exponentially large preimages (the elongated herding attack). In this work, we re-investigate speed vs. message length tradeoffs for the herding attack. Using a third parameter d, we introduce the generalized elongated multi...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
Abstract. In August 2012, the Stribog hash function was selected as the new Russian cryptographic ha...
This paper deals with definitional aspects of the herding attack of Kelsey and Kohno, and investigat...
Abstract. In this paper, we develop a new attack on Damg̊ard-Merkle hash functions, called the herdi...
International audienceIn this paper we present new attack techniques to analyze the structure of has...
Abstract. In this paper we present new attack techniques to analyze the structure of hash functions ...
Abstract. In this paper we extend the herding attacks for concatenated hash functions, i.e., hash fu...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
Abstract. Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in whic...
Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in which a linear...
In this paper, we analyze the complexity of the construction of the 2k-diamond structure proposed by...
Dithered hash functions were proposed by Rivest as a method to mitigate second preimage attacks on ...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
Abstract. In August 2012, the Stribog hash function was selected as the new Russian cryptographic ha...
This paper deals with definitional aspects of the herding attack of Kelsey and Kohno, and investigat...
Abstract. In this paper, we develop a new attack on Damg̊ard-Merkle hash functions, called the herdi...
International audienceIn this paper we present new attack techniques to analyze the structure of has...
Abstract. In this paper we present new attack techniques to analyze the structure of hash functions ...
Abstract. In this paper we extend the herding attacks for concatenated hash functions, i.e., hash fu...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
Abstract. Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in whic...
Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in which a linear...
In this paper, we analyze the complexity of the construction of the 2k-diamond structure proposed by...
Dithered hash functions were proposed by Rivest as a method to mitigate second preimage attacks on ...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
Abstract. In August 2012, the Stribog hash function was selected as the new Russian cryptographic ha...