At Eurocrypt 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash function to be regular, every hash value must have the same number of preimages in the domain. The findings of their paper remained unchallenged for over six years, and made their way into several research papers and textbooks. In their paper, Bellare and Kohno claim that regular hash functions are more resistant against the birthday attack than random hash functions. We counter their arguments, by showing that the success probability of the birthday attack against a regular hash function can be made arbitrarily close to that of a random hash function (for the same number of trials). Our analysis uses the fact that the choices of the attacker c...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Abstract. Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in whic...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash fu...
Abstract. At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For...
Combined with the iterated constructions of Coron et al., our result leads to the first iterated con...
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the sec...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaning...
Abstract. Recently, some collisions have been exposed for a variety of cryptographic hash functions ...
Abstract. We present a cryptanalysis of a provably secure cryptographic hash function proposed by Au...
Our main result gives a way to instantiate the random oracle with a concrete hash function in “full ...
We analyze a generic birthday attack where distinct inputs to some function $f$ are selected until t...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
The Zemor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Abstract. Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in whic...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For a hash fu...
Abstract. At EUROCRYPT 2004, Bellare and Kohno presented the concept of a regular hash function. For...
Combined with the iterated constructions of Coron et al., our result leads to the first iterated con...
At CRYPTO 2006, Halevi and Krawczyk proposed two randomized hash function modes and analyzed the sec...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaning...
Abstract. Recently, some collisions have been exposed for a variety of cryptographic hash functions ...
Abstract. We present a cryptanalysis of a provably secure cryptographic hash function proposed by Au...
Our main result gives a way to instantiate the random oracle with a concrete hash function in “full ...
We analyze a generic birthday attack where distinct inputs to some function $f$ are selected until t...
In the talk, we shall discuss quality measures for hash functions used in data structures and algori...
The Zemor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Abstract. Knudsen and Preneel (Asiacrypt’96 and Crypto’97) introduced a hash function design in whic...
The Zémor-Tillich hash function has remained unbroken since its introduction at CRYPTO'94. We presen...