Sciweavers

59 search results - page 4 / 12
» Cryptanalysis of the Yi-Lam Hash
Sort
View
ACNS
2008
Springer
107views Cryptology» more  ACNS 2008»
14 years 4 months ago
Attacking Reduced Round SHA-256
The SHA-256 hash function has started getting attention recently by the cryptanalysis community
Somitra Kumar Sanadhya, Palash Sarkar
CISC
2009
Springer
181views Cryptology» more  CISC 2009»
13 years 7 months ago
Cryptanalysis of the ESSENCE Family of Hash Functions
Abstract. ESSENCE is a family of cryptographic hash functions, accepted to the first round of NIST's SHA-3 competition. This paper presents the first known attacks on ESSENCE....
Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson...
FSE
2009
Springer
148views Cryptology» more  FSE 2009»
14 years 1 months ago
Cryptanalysis of the LAKE Hash Family
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitiv...
Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitr...
CTRSA
2008
Springer
118views Cryptology» more  CTRSA 2008»
13 years 11 months ago
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes
Pierre-Alain Fouque, Gaëtan Leurent
ASIACRYPT
2008
Springer
13 years 11 months ago
Slide Attacks on a Class of Hash Functions
This paper studies the application of slide attacks to hash functions. Slide attacks have mostly been used for block cipher cryptanalysis. But, as shown in the current paper, they ...
Michael Gorski, Stefan Lucks, Thomas Peyrin