Hash functions are often used to consistently assign objects to particular resources, for example to load balancing in networks. These functions can be randomly selected from a family, to prevent attackers generating many colliding objects, which usually results in poor performance.We describe a number of attacks allowing us to identify which hash function from a family is being used by observing a relatively small number of collisions. This knowledge can then be used to generate a large number of colliding inputs. In particular we detail attacks against small families of hashes, Pearson-like hash functions and linear hashes, such as the Toeplitz hash used in Microsoft’s Receive Side Scaling
. This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses o...
We describe a new tool for the search of collisions for hash functions. The tool is applicable when ...
Cryptographic hash functions compute a small fixed-size hash value for any given message. A main app...
Hash functions are often used to consistently assign objects to particular resources, for example t...
Most cryptographic protocols use cryptographic hash functions as a building block. The security anal...
In the recent years, several practical methods have been published to compute collisions on some com...
Abstract. In this paper, we develop a new attack on Damg̊ard-Merkle hash functions, called the herdi...
Current techniques for collision search with feasible memory requirements involve pseudo-random walk...
At the Crypto 2005 rump session, a new hash function based upon a chaotic map was presented. We disp...
Over the last two or three years there has been a huge amount of interest in hash-function specific ...
This lecture discusses a very neat paper of Mitzenmacher and Vadhan [8], which proposes a robust mea...
Hash functions are considered key components of nearly all cryptographic protocols, as well as of ma...
In this note, we report several solutions to the STARK-Friendly Hash Challenge: a competition with t...
In this thesis we study the security of a number of dedicated cryptographic hash functions against c...
We introduce a statistical experiment setting to carry out a multicollision attack on any iterated h...
. This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses o...
We describe a new tool for the search of collisions for hash functions. The tool is applicable when ...
Cryptographic hash functions compute a small fixed-size hash value for any given message. A main app...
Hash functions are often used to consistently assign objects to particular resources, for example t...
Most cryptographic protocols use cryptographic hash functions as a building block. The security anal...
In the recent years, several practical methods have been published to compute collisions on some com...
Abstract. In this paper, we develop a new attack on Damg̊ard-Merkle hash functions, called the herdi...
Current techniques for collision search with feasible memory requirements involve pseudo-random walk...
At the Crypto 2005 rump session, a new hash function based upon a chaotic map was presented. We disp...
Over the last two or three years there has been a huge amount of interest in hash-function specific ...
This lecture discusses a very neat paper of Mitzenmacher and Vadhan [8], which proposes a robust mea...
Hash functions are considered key components of nearly all cryptographic protocols, as well as of ma...
In this note, we report several solutions to the STARK-Friendly Hash Challenge: a competition with t...
In this thesis we study the security of a number of dedicated cryptographic hash functions against c...
We introduce a statistical experiment setting to carry out a multicollision attack on any iterated h...
. This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses o...
We describe a new tool for the search of collisions for hash functions. The tool is applicable when ...
Cryptographic hash functions compute a small fixed-size hash value for any given message. A main app...