[PDF][PDF] Key lengths

AK Lenstra - The Handbook of Information Security, 2006 - infoscience.epfl.ch
The key length used for a cryptographic protocol determines the highest security it can offer.
If the key is found or 'broken', the security is undermined. Thus, key lengths must be chosen …

Recent developments in cryptographic hash functions: Security implications and future directions

C Cid - Information security technical report, 2006 - Elsevier
One of the most important classes of cryptographic algorithms in current use is the class of
cryptographic hash functions. Hash functions are ubiquitous in today's IT systems and have …

[PDF][PDF] Compare-by-Hash: A Reasoned Analysis.

J Black - USENIX Annual Technical Conference, General Track, 2006 - usenix.org
Compare-by-hash is the now-common practice used by systems designers who assume that
when the digest of a cryptographic hash function is equal on two distinct files, then those …

Radiogatun, a belt-and-mill hash function

G Bertoni, J Daemen, M Peeters… - Cryptology ePrint …, 2006 - eprint.iacr.org
We present an approach to design cryptographic hash functions that builds on and improves
the one underlying the Panama hash function. We discuss the properties of the resulting …

On the collision resistance of RIPEMD-160

F Mendel, N Pramstaller, C Rechberger… - Information Security: 9th …, 2006 - Springer
In this article, the RIPEMD-160 hash function is studied in detail. To analyze the hash
function, we have extended existing approaches and used recent results in cryptanalysis …

A new dedicated 256-bit hash function: FORK-256

D Hong, D Chang, J Sung, S Lee, S Hong… - Fast Software Encryption …, 2006 - Springer
This paper describes a new software-efficient 256-bit hash function, FORK-256. Recently
proposed attacks on MD5 and SHA-1 motivate a new hash function design. It is designed …

Side channel attacks against HMACs based on block-cipher based hash functions

K Okeya - Australasian Conference on Information Security and …, 2006 - Springer
HMAC is one of the most famous keyed hash functions, and widely utilized. In order to
design secure hash functions, we often use PGV construction consisting of 64 schemes …

Secure mutual network authentication and key exchange protocol

VV Boyko, E Grosse, PD MacKenzie, S Patel - US Patent 7,047,408, 2006 - Google Patents
6,028,937 A* 2/2000 Tatebayashi et a1......... 713/169 dance with other embodiments of the
invention, in order to protect against a security compromise at the server, the server is not in …

High-speed FPGA implementation of secure hash algorithm for IPSec and VPN applications

AP Kakarountas, H Michail, A Milidonis… - The Journal of …, 2006 - Springer
Hash functions are special cryptographic algorithms, which are applied wherever message
integrity and authentication are critical. Implementations of these functions are cryptographic …

A compact FPGA implementation of the hash function Whirlpool

N Pramstaller, C Rechberger, V Rijmen - … of the 2006 ACM/SIGDA 14th …, 2006 - dl.acm.org
Recent breakthroughs in cryptanalysis of standard hash functions like SHA-1 and MD5 raise
the need for alternatives. A credible alternative to for instance SHA-1 or the SHA-2 family of …