Hash functions are a very important cryptographic primitive. The collision resistance of provable hash functions relies on hard mathematical problems. This makes them very appealing for the cryptographic community since collision resistance is by far the most important property that a hash function should satisfy. However, provable hash functions tend to be slower than specially-designed hash functions like SHA, and their algebraic structure often implies homomorphic properties and weak behaviors on particular inputs. We introduce the ZesT hash function, a provable hash function that is based on the Zemor-Tillich hash function. ZesT is provably collision and preimage resistant if the balance problem corresponding to Zemor-Tillich is hard, a...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
After 15 years of unsuccessful cryptanalysis attempts by the research community, Grassl et al. have ...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
Recent breakthroughs concerning the current standard SHA-1 prompted NIST to launch a competition for...
Hash functions are widely used in Cryptography, and hardware implementations of hash functions are o...
The Zemor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Hash functions are an invaluable tool for cryptography. They must primarily satisfy collision resist...
Cryptographic hash functions map input strings of arbitrary length to fixed length output strings. T...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
International audienceThe Zémor-Tillich hash function has remained unbroken since its introduction a...
© Springer-Verlag Berlin Heidelberg 1993. Collision resistant hash functions are an important basic ...
The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerge...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
After 15 years of unsuccessful cryptanalysis attempts by the research community, Grassl et al. have ...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...
Recent breakthroughs concerning the current standard SHA-1 prompted NIST to launch a competition for...
Hash functions are widely used in Cryptography, and hardware implementations of hash functions are o...
The Zemor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Hash functions are an invaluable tool for cryptography. They must primarily satisfy collision resist...
Cryptographic hash functions map input strings of arbitrary length to fixed length output strings. T...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
International audienceThe Zémor-Tillich hash function has remained unbroken since its introduction a...
© Springer-Verlag Berlin Heidelberg 1993. Collision resistant hash functions are an important basic ...
The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerge...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
After 15 years of unsuccessful cryptanalysis attempts by the research community, Grassl et al. have ...
We introduce VSH, very smooth hash, a new S-bit hash function that is provably collision-resistant a...