The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, called the SHA-3 competition, aiming at definining a new standard for hash functions. We study here the algebraic properties of some of the candidates to this contest. Among the functions analyzed, is the Keccak algorithm, which was recently announced to be the winning proposal and thus the new standard SHA-3. We study, in a first time, a new class of distinguishers introduced in 2009 and called the zero-sum distinguishers. We apply these distinguishers to some of the candidates of the SHA-3 competition. Next, we investigate the algebraic degree of iterated permutations. We establish, at a first step, a new bound exploiting the usual structure o...
Nous traitons dans cette thèse de la sécurité de fonctions cryptographiques symétriques. Dans une pr...
In this paper, we investigate Keccak --- the cryptographic hash function adopted as the SHA-3 standa...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, cal...
This Thesis focuses on hash functions, which are used in numerous cryptographic mechanisms. We prese...
Cryptographic hash functions play an important role in the security of many applications such as dig...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
Cryptographic hash functions map input strings of arbitrary length to fixed length output strings. T...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
The SHA-3 competition for the new cryptographic standard was initiated by National Institute of Stan...
The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerge...
In this note we give an overview on the current state of the SHA-3 candidates. First, we classify al...
In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the desi...
In this paper we attack round-reduced Keccak hash function with a technique called rotational crypta...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Nous traitons dans cette thèse de la sécurité de fonctions cryptographiques symétriques. Dans une pr...
In this paper, we investigate Keccak --- the cryptographic hash function adopted as the SHA-3 standa...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
The National Institute of Standards and Technology (NIST) launched in 2008 a public competition, cal...
This Thesis focuses on hash functions, which are used in numerous cryptographic mechanisms. We prese...
Cryptographic hash functions play an important role in the security of many applications such as dig...
A hash function is a function taking as argument an element of finite arbitrary length and returning...
Cryptographic hash functions map input strings of arbitrary length to fixed length output strings. T...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
The SHA-3 competition for the new cryptographic standard was initiated by National Institute of Stan...
The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerge...
In this note we give an overview on the current state of the SHA-3 candidates. First, we classify al...
In 2007, the US National Institute for Standards and Technology (NIST) announced a call for the desi...
In this paper we attack round-reduced Keccak hash function with a technique called rotational crypta...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Nous traitons dans cette thèse de la sécurité de fonctions cryptographiques symétriques. Dans une pr...
In this paper, we investigate Keccak --- the cryptographic hash function adopted as the SHA-3 standa...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...