International audienceA cryptographic hash function is a deterministic procedure that compresses an arbitrary block of numerical data and returns a fixed-size bit string. There exists many hash functions: MD5, HAVAL, SHA, ... It was reported that these hash functions are no longer secure. Our work is focused on the construction of a new hash function based on composition of functions. The construction used the NP-completeness of Three-dimensional contingency tables and the relaxation of the constraint that a hash function should also be a compression function.Une fonction de hachage cryptographique est une procédure déterministe qui compresse un ensemble de données numériques de taille arbitraire en une chaîne de bits de taille fixe. Il exi...
Abstract. In this article, it is discussed how to construct a compres-sion function with 2n-bit outp...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
This paper considers iterated hash functions. It proposes new constructions of fast and secure compr...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
Abstract. In this article, it is discussed how to construct a compression function with 2n-bit outpu...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
© Springer-Verlag Berlin Heidelberg 1993. Collision resistant hash functions are an important basic ...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Abstract. In this article, it is discussed how to construct a compres-sion function with 2n-bit outp...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
This paper considers iterated hash functions. It proposes new constructions of fast and secure compr...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
Abstract. In this article, it is discussed how to construct a compression function with 2n-bit outpu...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
© Springer-Verlag Berlin Heidelberg 1993. Collision resistant hash functions are an important basic ...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Abstract. In this article, it is discussed how to construct a compres-sion function with 2n-bit outp...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
This paper considers iterated hash functions. It proposes new constructions of fast and secure compr...