In this paper we investigate weak keys of universal hash functions (UHFs) from their combinatorial properties. We find that any UHF has a general class of keys, which makes the combinatorial properties totally disappear, and even compromises the security of the UHF-based schemes, such as the Wegman-Carter scheme, the UHF-then-PRF scheme, etc. By this class of keys, we actually get a general method to search weak-key classes of UHFs, which is able to derive all previous weak-key classes of UHFs found by intuition or experience. Moreover we give a weak-key class of the BRW polynomial function which was once believed to have no weak-key issue, and exploit such weak keys to implement a distinguish attack and a forgery attack against DTC - a BRW...
This paper revisits the construction of Universal One-Way Hash Functions (UOWHFs) from any one-way f...
International audienceWe analyze a new key recovery attack against the Quasi-Cyclic MDPC McEliece sc...
CRAFT is a lightweight tweakable Substitution-Permutation-Network (SPN) block cipher optimized for e...
Universal hash functions are commonly used primitives for fast and secure message authentication in ...
Universal hash functions (UHFs) have been extensively used in the design of cryptographic schemes. I...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
Abstract. This paper discusses key recovery and universal forgery at-tacks on several MAC algorithms...
Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in compu...
The idea of a universal class of hash functions is due to Carter and Wegman. The goal is to define a...
Hash functions are often constructed based on permutations or blockciphers, and security proofs are ...
A key derivation function is a function that generate one or more cryptographic keys from a private ...
Some types of weak keys in the Faure-Loidreau (FL) cryptosystem are presented. We show that from suc...
In this paper we investigate the invariant property of PRINTcipher first discovered by Leander et al...
We describe a novel type of weak cryptographic private key that can exist in any discrete logarithm ...
Abstract. Polynomial hashing as an instantiation of universal hashing is a widely employed method fo...
This paper revisits the construction of Universal One-Way Hash Functions (UOWHFs) from any one-way f...
International audienceWe analyze a new key recovery attack against the Quasi-Cyclic MDPC McEliece sc...
CRAFT is a lightweight tweakable Substitution-Permutation-Network (SPN) block cipher optimized for e...
Universal hash functions are commonly used primitives for fast and secure message authentication in ...
Universal hash functions (UHFs) have been extensively used in the design of cryptographic schemes. I...
This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on u...
Abstract. This paper discusses key recovery and universal forgery at-tacks on several MAC algorithms...
Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in compu...
The idea of a universal class of hash functions is due to Carter and Wegman. The goal is to define a...
Hash functions are often constructed based on permutations or blockciphers, and security proofs are ...
A key derivation function is a function that generate one or more cryptographic keys from a private ...
Some types of weak keys in the Faure-Loidreau (FL) cryptosystem are presented. We show that from suc...
In this paper we investigate the invariant property of PRINTcipher first discovered by Leander et al...
We describe a novel type of weak cryptographic private key that can exist in any discrete logarithm ...
Abstract. Polynomial hashing as an instantiation of universal hashing is a widely employed method fo...
This paper revisits the construction of Universal One-Way Hash Functions (UOWHFs) from any one-way f...
International audienceWe analyze a new key recovery attack against the Quasi-Cyclic MDPC McEliece sc...
CRAFT is a lightweight tweakable Substitution-Permutation-Network (SPN) block cipher optimized for e...