Sciweavers

20 search results - page 1 / 4
» The Breaking of the AR Hash Function
Sort
View
EUROCRYPT
1993
Springer
13 years 11 months ago
The Breaking of the AR Hash Function
Ivan Damgård, Lars R. Knudsen
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
13 years 11 months ago
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today ...
Jonathan J. Hoch, Adi Shamir
FSE
2008
Springer
111views Cryptology» more  FSE 2008»
13 years 9 months ago
The Hash Function Family LAKE
The aim of this paper is to advocate a new software-oriented hash function family based on the HAIFA framework of Biham and Dunkelman, inheriting built-in randomized hashing and hi...
Jean-Philippe Aumasson, Willi Meier, Raphael C.-W....
EUROCRYPT
2005
Springer
14 years 1 months ago
How to Break MD5 and Other Hash Functions
Abstract. MD5 is one of the most widely used cryptographic hash functions nowadays. It was designed in 1992 as an improvement of MD4, and its security was widely studied since then...
Xiaoyun Wang, Hongbo Yu
SACRYPT
2005
Springer
125views Cryptology» more  SACRYPT 2005»
14 years 1 months ago
Breaking a New Hash Function Design Strategy Called SMASH
Norbert Pramstaller, Christian Rechberger, Vincent...