Multicollisions in iterated hash functions. Application to cascaded constructions

A Joux - Annual International Cryptology Conference, 2004 - Springer
In this paper, we study the existence of multicollisions in iterated hash functions. We show
that finding multicollisions, ie r-tuples of messages that all hash to the same value, is not …

Design principles for iterated hash functions

S Lucks - Cryptology ePrint Archive, 2004 - eprint.iacr.org
This paper deals with the security of iterated hash functions against generic attacks, such as,
eg, Joux'multicollision attacks from Crypto 04. The core idea is to increase the size of the …

Zero-knowledge proofs and string commitments withstanding quantum attacks

I Damgård, S Fehr, L Salvail - … in Cryptology–CRYPTO 2004: 24th Annual …, 2004 - Springer
The concept of zero-knowledge (ZK) has become of fundamental importance in
cryptography. However, in a setting where entities are modeled by quantum computers …

The MD2 hash function is not one-way

F Muller - International Conference on the Theory and …, 2004 - Springer
MD2 is an early hash function developed by Ron Rivest for RSA Security, that produces
message digests of 128 bits. In this paper, we show that MD2 does not reach the ideal …

A characterization and some properties of the Banzhaf–Coleman–Dubey–Shapley sensitivity index

R Barua, SR Chakravarty, S Roy, P Sarkar - Games and Economic …, 2004 - Elsevier
A sensitivity index quantifies the degree of smoothness with which it responds to fluctuations
in the wishes of the members of a voting body. This paper characterizes the Banzhaf …

Watermarking on CNN‐UM for image and video authentication

ME Yalçın, J Vandewalle, P Arena… - … Journal of Circuit …, 2004 - Wiley Online Library
In this paper a new approach to fragile watermarking technique is introduced. This problem
is particularly interesting in the field of modern multimedia applications, when image and …

[PDF][PDF] CRUSH: A New Cryptographic Hash Function using Iterated Halving Technique.

P Gauravaram, W Millan, L May - Cryptographic Algorithms and their Uses, 2004 - Citeseer
Most of the currently accepted designs for cryptographic hash functions are in the style of a
block cipher in feed-forward mode. With increasing interest in all forms of cryptanalysis, this …

[PDF][PDF] Normality of Bent Functions Monomial and Binomial Bent Functions

NG Leander - 2004 - researchgate.net
For arbitrary Boolean functions, an easy counting argument shows that there must exist non
normal functions of n variables for n> 10. It was even shown in [21] that, for increasing …

[图书][B] Privacy preserving information sharing

AV Evfimievski - 2004 - search.proquest.com
Modern business creates an increasing need for sharing, querying and mining information
across autonomous enterprises while maintaining privacy of their own data records. The …

ECRYPT: The cryptographic research challenges for the next decade

B Preneel - … Conference on Security in Communication Networks, 2004 - Springer
In the past thirty years, cryptology has evolved from a secret art to a modern science. Weaker
algorithms and algorithms with short keys are disappearing, political controls of …