Sciweavers

109 search results - page 3 / 22
» Analysis of All-or-Nothing Hash Functions
Sort
View
JISE
2008
64views more  JISE 2008»
13 years 9 months ago
Analysis of All-or-Nothing Hash Functions
Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu
ACNS
2011
Springer
254views Cryptology» more  ACNS 2011»
13 years 1 months ago
Linear Analysis of Reduced-Round CubeHash
Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
Tomer Ashur, Orr Dunkelman
DCC
2008
IEEE
14 years 9 months ago
A synthetic indifferentiability analysis of some block-cipher-based hash functions
At ASIACRYPT 2006, Chang et al. analyzed the indifferentiability of some popular hash functions based on block ciphers, namely, the twenty collision resistant PGV, the MDC2 and th...
Zheng Gong, Xuejia Lai, Kefei Chen
WG
1993
Springer
14 years 1 months ago
Graphs, Hypergraphs and Hashing
Minimal perfect hash functions are used for memory efficient storage and fast retrieval of items from static sets. We present an infinite family of efficient and practical algori...
George Havas, Bohdan S. Majewski, Nicholas C. Worm...
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
14 years 1 months ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin