Formal Algebraic Reasoning About Compression Function Security

Z Javar - 2024 - dspace.library.uvic.ca
Cryptographic hash functions are fundamental in cryptographic constructions, as they
transform variable-length input into fixed-length output while maintaining essential security …

Preimage Awareness in Linicrypt

Z Javar, BM Kapron - 2023 IEEE 36th Computer Security …, 2023 - ieeexplore.ieee.org
We extend the analysis of collision-resistant hash functions in the Linicrypt model presented
by McQuoid, Swope & Rosulek (TCC 2019) in order to characterize preimage awareness, a …

Linicrypt in the Ideal Cipher Model

Z Javar, BM Kapron - International Conference on Provable Security, 2023 - Springer
We extend the Linicrypt framework for characterizing hash function security as proposed by
McQuoid, Swope, and Rosulek (TCC 2018) to support constructions in the ideal cipher …

Verification of implementations of cryptographic hash functions

D Wang, Y Jiang, H Song, F He, M Gu, J Sun - IEEE Access, 2017 - ieeexplore.ieee.org
Cryptographic hash functions have become the basis of modern network computing for
identity authorization and secure computing; protocol consistency of cryptographic hash …

Open problems in hash function security

E Andreeva, B Mennink, B Preneel - Designs, Codes and Cryptography, 2015 - Springer
A cryptographic hash function compresses arbitrarily long messages to digests of a short
and fixed length. Most of existing hash functions are designed to evaluate a compression …

Exploring Formal Methods for Cryptographic Hash Function Implementations

N Mouha - Australasian Conference on Information Security and …, 2023 - Springer
Cryptographic hash functions are used inside many applications that critically rely on their
resistance against cryptanalysis attacks and the correctness of their implementations …

Constructing an ideal hash function from weak ideal compression functions

M Liskov - Selected Areas in Cryptography: 13th International …, 2007 - Springer
We introduce the notion of a weak ideal compression function, which is vulnerable to strong
forms of attack, but is otherwise random. We show that such weak ideal compression …

Cryptophia's short combiner for collision-resistant hash functions

A Mittelbach - Applied Cryptography and Network Security: 11th …, 2013 - Springer
A combiner for collision-resistant hash functions takes two functions as input and
implements a hash function with the guarantee that it is collision-resistant if one of the …

On high-rate cryptographic compression functions

R Ostertág, M Stanek - Computing and Informatics, 2007 - cai.sk
The security of iterated hash functions relies on the properties of underlying compression
functions. We study highly efficient compression functions based on block ciphers. We …

Provable security of BLAKE with non-ideal compression function

E Andreeva, A Luykx, B Mennink - … 2012, Windsor, ON, Canada, August 15 …, 2013 - Springer
We analyze the security of the SHA-3 finalist BLAKE. The BLAKE hash function follows the
HAIFA design methodology, and as such it achieves optimal preimage, second preimage …