International audienceHash combiners are a practical way to make cryptographic hash functions more tolerant to future attacks and compatible with existing infrastructure. A combiner combines two or more hash functions in a way that is hopefully more secure than each of the underlying hash functions, or at least remains secure as long as one of them is secure. Two classical hash combiners are the exclusive-or (XOR) com-biner H1(M)⊕H2(M) and the concatenation combiner H1(M) H2(M). Both of them process the same message using the two underlying hash functions in parallel. Apart from parallel combiners, there are also cascade constructions sequentially calling the underlying hash functions to process the message repeatedly, such as Hash-Twice H2...
In this note we show a consequence of the recent observation that narrow-pipe hash designs manifest ...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
A hash function usually has two main components: a compression function or permutation function and ...
This paper studies functional-graph-based (second) preimage attacks against hash combiners. By explo...
International audienceIn this paper we study the security of summing the outputs of two independent ...
A hash function is an algorithm that compresses messages of arbitrary length into short digests of f...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
Suppose we have two hash functions h1 and h2, but we trust the security of only one of them. To miti...
A $(k,l)$ hash-function combiner for property $P$ is a construction that, given access to $l$ hash f...
International audienceWe develop a new generic long-message second preimage attack, based on combini...
Includes bibliographical references (leaves 126-132).We survery the existing generic attacks on hash...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
© Springer International Publishing Switzerland 2014. A combiner is a construction formed out of two...
Cryptographic hash functions are used in many cryptographic applications, and the design of provably...
Abstract. A robust combiner for hash functions takes two candidate implemen-tations and constructs a...
In this note we show a consequence of the recent observation that narrow-pipe hash designs manifest ...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
A hash function usually has two main components: a compression function or permutation function and ...
This paper studies functional-graph-based (second) preimage attacks against hash combiners. By explo...
International audienceIn this paper we study the security of summing the outputs of two independent ...
A hash function is an algorithm that compresses messages of arbitrary length into short digests of f...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
Suppose we have two hash functions h1 and h2, but we trust the security of only one of them. To miti...
A $(k,l)$ hash-function combiner for property $P$ is a construction that, given access to $l$ hash f...
International audienceWe develop a new generic long-message second preimage attack, based on combini...
Includes bibliographical references (leaves 126-132).We survery the existing generic attacks on hash...
International audienceThe security of HMAC (and more general hash-based MACs) against state-recovery...
© Springer International Publishing Switzerland 2014. A combiner is a construction formed out of two...
Cryptographic hash functions are used in many cryptographic applications, and the design of provably...
Abstract. A robust combiner for hash functions takes two candidate implemen-tations and constructs a...
In this note we show a consequence of the recent observation that narrow-pipe hash designs manifest ...
International audienceIn this work we present several new generic second-preimage attacks on hash fu...
A hash function usually has two main components: a compression function or permutation function and ...