X Lai, JL Massey - Workshop on the Theory and Application of of …, 1992 - Springer
Iterated hash functions based on block ciphers are treated. Five attacks on an iterated hash function and on its round function are formulated. The wisdom of strengthening such hash …
The subject of this thesis is the study of cryptographic hash functions. The importance of hash functions for protecting the authenticity of information is demonstrated. Applications …
RC Merkle - Conference on the Theory and Application of …, 1989 - Springer
One way hash functions are a major tool in cryptography. DES is the best known and most widely used encryption function in the commercial world today. Generating a one-way hash …
In Chapter 2, we listed the properties that a secure hash function should satisfy, among them was the property of one-wayness. Several approaches to constructing hash functions have …
S Hirose - International Workshop on Fast Software Encryption, 2006 - Springer
In this article, it is discussed how to construct a compression function with 2 n-bit output using a component function with n-bit output. The component function is either a smaller …
JS Coron, Y Dodis, C Malinaud, P Puniya - Advances in Cryptology …, 2005 - Springer
The most common way of constructing a hash function (eg, SHA-1) is to iterate a compression function on the input message. The compression function is usually designed …
This paper gives a survey on cryptographic hash functions. It gives an overview of all types of hash functions and reviews design principals and possible methods of attacks. It also …
Abstract Preneel, Govaerts, and Vandewalle [6] considered the 64 most basic ways to construct a hash function H:(0, 1)*→(0, 1) n from a block cipher E:(0, 1) n×(0, 10 n→(0, 1) n …
S Lucks - Cryptology ePrint Archive, 2004 - eprint.iacr.org
This paper deals with the security of iterated hash functions against generic attacks, such as, eg, Joux'multicollision attacks from Crypto 04. The core idea is to increase the size of the …