In the recent years, several practical methods have been published to compute collisions on some commonly used hash functions. In this paper we present a method to take into account, at the symbolic level, that an intruder actively attacking a protocol execution may use these collision algorithms in reasonable time during the attack. Our decision procedure relies on the reduction of constraint solving for an intruder exploiting the collision properties of hush functions to constraint solving for an intruder operating on words
Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to e...
Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of alg...
International audienceA chosen-prefix collision attack is a stronger variant of a collision attack, ...
. This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses o...
Cryptographic hash functions compute a small fixed-size hash value for any given message. A main app...
Hash functions are often used to consistently assign objects to particular resources, for example t...
The EnRUPT hash functions were proposed by O\u27Neil, Nohl and Henzen as candidates for the SHA-3 co...
Abstract. In this paper, we develop a new attack on Damg̊ard-Merkle hash functions, called the herdi...
This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses of his m...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
We describe a new tool for the search of collisions for hash functions. The tool is applicable when ...
Hash functions are considered key components of nearly all cryptographic protocols, as well as of ma...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
In this note, we report several solutions to the STARK-Friendly Hash Challenge: a competition with t...
Knudsen and Preneel (Asiacrypt'96 and Crypto'97) introduced a hash function design in which a linear...
Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to e...
Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of alg...
International audienceA chosen-prefix collision attack is a stronger variant of a collision attack, ...
. This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses o...
Cryptographic hash functions compute a small fixed-size hash value for any given message. A main app...
Hash functions are often used to consistently assign objects to particular resources, for example t...
The EnRUPT hash functions were proposed by O\u27Neil, Nohl and Henzen as candidates for the SHA-3 co...
Abstract. In this paper, we develop a new attack on Damg̊ard-Merkle hash functions, called the herdi...
This paper presents an attack on Gong's proposed collisionful hash function. The weaknesses of his m...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
We describe a new tool for the search of collisions for hash functions. The tool is applicable when ...
Hash functions are considered key components of nearly all cryptographic protocols, as well as of ma...
Counter-cryptanalysis, the concept of using cryptanalytic techniques to detect cryptanalytic attacks...
In this note, we report several solutions to the STARK-Friendly Hash Challenge: a competition with t...
Knudsen and Preneel (Asiacrypt'96 and Crypto'97) introduced a hash function design in which a linear...
Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to e...
Most of the decision procedures for symbolic analysis of protocols are limited to a fixed set of alg...
International audienceA chosen-prefix collision attack is a stronger variant of a collision attack, ...