We have found an operation between permutations in the symmetric group Sn upon which we have experimentally derived results that can be linked to desirable properties in cryptography, mainly in the domain of one-way functions. From it, we have implemented a beta version of an algorithm for a hashing function by exploiting the operation’s low computational cost for speed and its properties for security. Its design makes it resistant to length extension attacks and the encoding of blocks into permutations suggests that any differential cryptanalysis technique that is based on bit conditions should be useless against it. More precisely, when measuring the evolution of differences in the compression function, bit-based distances such as the exc...
"December 2013""A thesis submitted for the degreee of Doctor of Philosophy"Includes bibliographical ...
Abstract—This paper considers iterated hash functions. It pro-poses new constructions of fast and se...
This paper describes the study of cryptographic hash functions, one of the most important classes of...
We have found an operation between permutations in the symmetric group Sn upon which we have experim...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
"A thesis submitted to Macquarie University for the degree of Doctor of Philosophy, Department of Co...
Hash functions are an invaluable tool for cryptography. They must primarily satisfy collision resist...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
An alarmingly large number of different cryptosystems have been proposed for use with Internet Priva...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
It is hard to overestimate the ubiquity and importance of securecommunications and information proce...
Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to e...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
This thesis is about block ciphers and cryptographic hash functions, which are two essential primiti...
"December 2013""A thesis submitted for the degreee of Doctor of Philosophy"Includes bibliographical ...
Abstract—This paper considers iterated hash functions. It pro-poses new constructions of fast and se...
This paper describes the study of cryptographic hash functions, one of the most important classes of...
We have found an operation between permutations in the symmetric group Sn upon which we have experim...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
"A thesis submitted to Macquarie University for the degree of Doctor of Philosophy, Department of Co...
Hash functions are an invaluable tool for cryptography. They must primarily satisfy collision resist...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
An alarmingly large number of different cryptosystems have been proposed for use with Internet Priva...
Recent attacks on hash functions start by constructing a differential characteristic. By finding mes...
It is hard to overestimate the ubiquity and importance of securecommunications and information proce...
Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to e...
A function that compresses an arbitrarily large message into a fixed small size ‘message digest’ is ...
This thesis is about block ciphers and cryptographic hash functions, which are two essential primiti...
"December 2013""A thesis submitted for the degreee of Doctor of Philosophy"Includes bibliographical ...
Abstract—This paper considers iterated hash functions. It pro-poses new constructions of fast and se...
This paper describes the study of cryptographic hash functions, one of the most important classes of...