Sciweavers

434 search results - page 5 / 87
» Logical Analysis of Hash Functions
Sort
View
FSE
2010
Springer
147views Cryptology» more  FSE 2010»
14 years 1 months ago
Security Analysis of the Mode of JH Hash Function
Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nan...
JISE
2008
64views more  JISE 2008»
13 years 8 months ago
Analysis of All-or-Nothing Hash Functions
Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu
ACNS
2011
Springer
254views Cryptology» more  ACNS 2011»
13 years 5 days ago
Linear Analysis of Reduced-Round CubeHash
Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
Tomer Ashur, Orr Dunkelman
WG
1993
Springer
14 years 18 days ago
Graphs, Hypergraphs and Hashing
Minimal perfect hash functions are used for memory efficient storage and fast retrieval of items from static sets. We present an infinite family of efficient and practical algori...
George Havas, Bohdan S. Majewski, Nicholas C. Worm...
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
14 years 14 days ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin