© 2015, Springer-Verlag Berlin Heidelberg. A well-established method of constructing hash functions is to base them on non-compressing primitives, such as one-way functions or permutations. In this work, we present S r , an rn-to-n-bit compression function (for r≥ 1) making 2 r- 1 calls to n-to-n-bit primitives (random functions or permutations). S r compresses its inputs at a rate (the amount of message blocks per primitive call) up to almost 1/2, and it outperforms all existing schemes with respect to rate and/or the size of underlying primitives. For instance, instantiated with the 1600 -bit permutation of NIST’s SHA-3 hash function standard, it offers about 800 -bit security at a rate of almost 1/2, while SHA-3-512 itself achieves only...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
We consider the generic design of compression functions based on two n-bit permutations and XOR-base...
We consider the family of 2n-to-n-bit compression functions that are solely based on at most three p...
© 2015 by De Gruyter. We consider the generic design of compression functions based on two n-bit pe...
A public random function R: {0, 1}m → {0, 1}n is a function chosen uniformly at random from the set ...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
This paper considers iterated hash functions. It proposes new constructions of fast and secure compr...
Abstract—This paper considers iterated hash functions. It pro-poses new constructions of fast and se...
© 2016, Springer Science+Business Media New York. The idea of double block length hashing is to cons...
Cryptographic hash functions are used in many cryptographic applications, and the design of provably...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
We consider the generic design of compression functions based on two n-bit permutations and XOR-base...
We consider the family of 2n-to-n-bit compression functions that are solely based on at most three p...
© 2015 by De Gruyter. We consider the generic design of compression functions based on two n-bit pe...
A public random function R: {0, 1}m → {0, 1}n is a function chosen uniformly at random from the set ...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
This paper considers iterated hash functions. It proposes new constructions of fast and secure compr...
Abstract—This paper considers iterated hash functions. It pro-poses new constructions of fast and se...
© 2016, Springer Science+Business Media New York. The idea of double block length hashing is to cons...
Cryptographic hash functions are used in many cryptographic applications, and the design of provably...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
We consider the generic design of compression functions based on two n-bit permutations and XOR-base...