A hash function is an algorithm that compresses messages of arbitrary length into short digests of fixed length. If the function additionally satisfies certain security properties, it becomes a powerful tool in the design of cryptographic protocols. The most important property is collision-resistance, which requires that it should be hard to find two distinct messages that evaluate to the same hash value. When a hash function deploys secret keys, it can also be used as a pseudorandom function or message authentication code. However, recent attacks on collision-resistant hash functions caused a decrease of confidence that today’s candidates really have this property and have raised the question how to devise constructions that are more toler...
Abstract. Let A and B denote cryptographic primitives. A (k; m)-robust A-to-B combiner is a construc...
Cryptographic hash functions compute a small fixed-size hash value for any given message. A main app...
. This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses o...
A hash function is an algorithm that compresses messages of arbitrary length into short digests of f...
Abstract. A robust combiner for hash functions takes two candidate implemen-tations and constructs a...
www.cryptoplexity.de arno.mittelbach @ cased.de Abstract. A combiner for collision-resistant hash fu...
A $(k,l)$ hash-function combiner for property $P$ is a construction that, given access to $l$ hash f...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
Suppose we have two hash functions h1 and h2, but we trust the security of only one of them. To miti...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
International audienceHash combiners are a practical way to make cryptographic hash functions more t...
© Springer International Publishing Switzerland 2014. A combiner is a construction formed out of two...
htmlabstractA black-box combiner for collision resistant hash functions (CRHF) is a construction w...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
© 2015, Springer Science+Business Media New York. A cryptographic hash function compresses arbitrari...
Abstract. Let A and B denote cryptographic primitives. A (k; m)-robust A-to-B combiner is a construc...
Cryptographic hash functions compute a small fixed-size hash value for any given message. A main app...
. This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses o...
A hash function is an algorithm that compresses messages of arbitrary length into short digests of f...
Abstract. A robust combiner for hash functions takes two candidate implemen-tations and constructs a...
www.cryptoplexity.de arno.mittelbach @ cased.de Abstract. A combiner for collision-resistant hash fu...
A $(k,l)$ hash-function combiner for property $P$ is a construction that, given access to $l$ hash f...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
Suppose we have two hash functions h1 and h2, but we trust the security of only one of them. To miti...
Abstract. In this paper we study the security of summing the outputs of two independent hash functio...
International audienceHash combiners are a practical way to make cryptographic hash functions more t...
© Springer International Publishing Switzerland 2014. A combiner is a construction formed out of two...
htmlabstractA black-box combiner for collision resistant hash functions (CRHF) is a construction w...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
© 2015, Springer Science+Business Media New York. A cryptographic hash function compresses arbitrari...
Abstract. Let A and B denote cryptographic primitives. A (k; m)-robust A-to-B combiner is a construc...
Cryptographic hash functions compute a small fixed-size hash value for any given message. A main app...
. This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses o...