International audienceA cryptographic hash function is a deterministic procedure that compresses an arbitrary block of numerical data and returns a fixed-size bit string. There exists many hash functions: MD5, HAVAL, SHA, ... It was reported that these hash functions are no longer secure. Our work is focused on the construction of a new hash function based on composition of functions. The construction used the NP-completeness of Three-dimensional contingency tables and the relaxation of the constraint that a hash function should also be a compression function.Une fonction de hachage cryptographique est une procédure déterministe qui compresse un ensemble de données numériques de taille arbitraire en une chaîne de bits de taille fixe. Il exi...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
In this thesis we study the security of a number of dedicated cryptographic hash functions against c...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
This Thesis focuses on hash functions, which are used in numerous cryptographic mechanisms. We prese...
This Thesis focuses on hash functions, which are used in numerous cryptographic mechanisms. We prese...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
The paper discusses the security of hash function with Merkle-Damgård construction and provides the ...
Cryptographic hash functions are used in many cryptographic applications, and the design of provably...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
In this thesis we study the security of a number of dedicated cryptographic hash functions against c...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
International audienceA cryptographic hash function is a deterministic procedure that compresses an ...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
This Thesis focuses on hash functions, which are used in numerous cryptographic mechanisms. We prese...
This Thesis focuses on hash functions, which are used in numerous cryptographic mechanisms. We prese...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
The paper discusses the security of hash function with Merkle-Damgård construction and provides the ...
Cryptographic hash functions are used in many cryptographic applications, and the design of provably...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
In this thesis we study the security of a number of dedicated cryptographic hash functions against c...