Cryptanalysis of MD2

LR Knudsen, JE Mathiassen, F Muller… - Journal of cryptology, 2010 - Springer
This paper considers the hash function MD2 which was developed by Ron Rivest in 1989.
Despite its age, MD2 has withstood cryptanalytic attacks until recently. This paper contains …

Attacks on fast double block length hash functions

LR Knudsen, X Lai, B Preneel - Journal of Cryptology, 1998 - Springer
The security of hash functions based on a block cipher with a block length of m bits and a
key length of k bits, where k≦m, is considered. New attacks are presented on a large class …

Blind evaluation of location based queries using space transformation to preserve location privacy

A Khoshgozaran, H Shirani-Mehr, C Shahabi - GeoInformatica, 2013 - Springer
In this paper we propose a fundamental approach to perform the class of Range and
Nearest Neighbor (NN) queries, the core class of spatial queries used in location-based …

Block Ciphers—a survey

LR Knudsen - State of the Art in Applied Cryptography: Course on …, 1999 - Springer
In this paper we give a short overview of the state of the art of secret key block ciphers. We
focus on the main application of block ciphers, namely for encryption. The most important …

Limited-birthday distinguishers for hash functions: Collisions beyond the birthday bound can be meaningful

M Iwamoto, T Peyrin, Y Sasaki - … Conference on the Theory and Application …, 2013 - Springer
In this article, we investigate the use of limited-birthday distinguishers to the context of hash
functions. We first provide a proper understanding of the limited-birthday problem and …

[PDF][PDF] Upper bounds on the numbers of resilient functions and of bent functions

C Carlet, A Klapper - Proceedings of the 23rd Symposium on …, 2002 - researchgate.net
Bent and resilient functions play significant roles in cryptography, coding theory, and
combinatorics. However, the numbers of bent and resilient functions on a given number of …

[PDF][PDF] Нелинейные булевы функции: бент-функции и их обобщения

НН Токарева - Saarbrucken: LAP LAMBERT Academic Publishing, 2011 - old.math.nsc.ru
Bent functions deserve our bent to study them... 1 Работа относится к такой области
дискретной математики, как булевы функции и их приложения в комбинаторике …

The Grindahl hash functions

LR Knudsen, C Rechberger, SS Thomsen - Fast Software Encryption: 14th …, 2007 - Springer
In this paper we propose the Grindahl hash functions, which are based on components of
the Rijndael algorithm. To make collision search sufficiently difficult, this design has the …

Multicollision attacks on some generalized sequential hash functions

M Nandi, DR Stinson - IEEE transactions on Information Theory, 2007 - ieeexplore.ieee.org
A multicollision for a function is a set of inputs whose outputs are all identical. A. Joux
showed multicollision attacks on the classical iterated hash function. He also showed how …

A Novel Integrated Quantum-Resistant Cryptography for Secure Scientific Data Exchange in Ad Hoc Networks

KK Singamaneni, G Muhammad - Ad Hoc Networks, 2024 - Elsevier
The fast advancement of quantum computing poses a substantial challenge to the privacy
and security of critical scientific research data. This is because the standard cryptography …