With the large scale proliferation of networked devices ranging from medical implants like pacemakers and insulin pumps, to corporate information assets, secure authentication, data integrity and confidentiality have become some of the central goals for cybersecurity. Cryptographic hash functions have many applications in information security and are commonly used to verify data authenticity. Our research focuses on the study of the properties that dictate the security of a cryptographic hash functions that use Even-Mansour type of ciphers in their underlying structure. In particular, we investigate the algebraic design requirements of the Grøstl hash function and its generalizations. Grøstl is an iterated hash function with a compression f...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
Cryptographic hash functions play an important role in the security of many applications such as dig...
This paper describes the study of cryptographic hash functions, one of the most important classes of...
With the large scale proliferation of networked devices ranging from medical implants like pacemaker...
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression functio...
© 2015, Springer Science+Business Media New York. A cryptographic hash function compresses arbitrari...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Hash functions are cryptographic tools that are used in various applications like digital signature,...
Hash functions are being used as building blocks in such diverse primitives as commitment schemes, m...
The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerge...
This Thesis focuses on hash functions, which are used in numerous cryptographic mechanisms. We prese...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in ef...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
Cryptographic hash functions play an important role in the security of many applications such as dig...
This paper describes the study of cryptographic hash functions, one of the most important classes of...
With the large scale proliferation of networked devices ranging from medical implants like pacemaker...
Grøstl is a SHA-3 candidate proposal. Grøstl is an iterated hash function with a compression functio...
© 2015, Springer Science+Business Media New York. A cryptographic hash function compresses arbitrari...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Hash functions are cryptographic tools that are used in various applications like digital signature,...
Hash functions are being used as building blocks in such diverse primitives as commitment schemes, m...
The first designs of cryptographic hash functions date back to the late 1970s; more proposals emerge...
This Thesis focuses on hash functions, which are used in numerous cryptographic mechanisms. We prese...
This thesis deals with the analysis and design of cryptographic hash functions that are fundamental ...
Cryptographic hash functions are an important tool of cryptography and play a fundamental role in ef...
Cryptographic hash functions are an essential building block for security applications. Until 2005, ...
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
Cryptographic hash functions play an important role in the security of many applications such as dig...
This paper describes the study of cryptographic hash functions, one of the most important classes of...