On the security of iterated message authentication codes

B Preneel, PC Van Oorschot - IEEE Transactions on …, 1999 - ieeexplore.ieee.org
The security of iterated message authentication code (MAC) algorithms is considered, and in
particular, those constructed from unkeyed hash functions. A new MAC forgery attack …

Fast evaluation, weights and nonlinearity of rotation-symmetric functions

TW Cusick, P Stănică - Discrete mathematics, 2002 - Elsevier
We study the nonlinearity and the weight of the rotation-symmetric (RotS) functions defined
by Pieprzyk and Qu. We give exact results for the nonlinearity and weight of 2-degree RotS …

Cryptographic hash functions: Recent design trends and security notions

S Al-Kuwari, JH Davenport, RJ Bradford - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Recent years have witnessed an exceptional research interest in cryptographic hash
functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the …

Design principles for iterated hash functions

S Lucks - Cryptology ePrint Archive, 2004 - eprint.iacr.org
This paper deals with the security of iterated hash functions against generic attacks, such as,
eg, Joux'multicollision attacks from Crypto 04. The core idea is to increase the size of the …

Semi-bent functions

S Chee, S Lee, K Kim - Advances in Cryptology—ASIACRYPT'94: 4th …, 1995 - Springer
Highly nonlinear balanced Boolean functions both satisfying the propagation criterion and
having almost uniform correlation values with all linear functions are very important in the …

The first 30 years of cryptographic hash functions and the NIST SHA-3 competition

B Preneel - Cryptographers' track at the RSA conference, 2010 - Springer
The first designs of cryptographic hash functions date back to the late 1970s; more
proposals emerged in the 1980s. During the 1990s, the number of hash function designs …

Designing two secure keyed hash functions based on sponge construction and the chaotic neural network

N Abdoun, S El Assad, T Manh Hoang, O Deforges… - Entropy, 2020 - mdpi.com
In this paper, we propose, implement, and analyze the structures of two keyed hash
functions using the Chaotic Neural Network (CNN). These structures are based on Sponge …

A simple secure hash function scheme using multiple chaotic maps

M Ahmad, S Khurana, S Singh, HD AlSharari - 3D Research, 2017 - Springer
The chaotic maps posses high parameter sensitivity, random-like behavior and one-way
computations, which favor the construction of cryptographic hash functions. In this paper, we …

Relation between spectra of Narain CFTs and properties of associated boolean functions

Y Furuta - Journal of High Energy Physics, 2022 - Springer
A bstract Recently, the construction of Narain CFT from a certain class of quantum error
correcting codes has been discovered. In particular, the spectral gap of Narain CFT …

Quantum hash function based on controlled alternate lively quantum walks

P Hou, T Shang, Y Zhang, Y Tang, J Liu - Scientific Reports, 2023 - nature.com
Quantum hash function is an important area of interest in the field of quantum cryptography.
Quantum hash function based on controlled alternate quantum walk is a mainstream branch …