Building a collision-resistant compression function from non-compressing primitives

T Shrimpton, M Stam - … Colloquium, ICALP 2008, Reykjavik, Iceland, July …, 2008 - Springer
We consider how to build an efficient compression function from a small number of random,
non-compressing primitives. Our main goal is to achieve a level of collision resistance as …

Ensuring correctness over untrusted private database

S Singh, S Prabhakar - Proceedings of the 11th international conference …, 2008 - dl.acm.org
In this paper we address the problem of ensuring the correctness of query results returned
by an untrusted private database. The database owns the data and may modify it at any …

[PDF][PDF] Analyse de fonctions de hachage cryptographiques

T Peyrin - 2008 - thomaspeyrin.github.io
Je souhaite adresser mes premiers remerciements à Henri Gilbert, qui a accepté de
m'encadrer tout au long de mon travail de recherche. Son amabilité, sa patience et sa …

The state of hash functions and the NIST SHA-3 competition

B Preneel - International Conference on Information Security and …, 2008 - Springer
Cryptographic hash functions play a central role in applications of cryptography. In spite of
this, there has been only limited interest for theoretical work on the definitions and …

A critical look at cryptographic hash function literature

S Contini, R Steinfeld, J Pieprzyk… - Coding and …, 2008 - World Scientific
The cryptographic hash function literature has numerous hash function definitions and hash
function requirements, and many of them disagree. This survey talks about the various …

Key technologies for security enhancing of payment gateway

X Zhang, L Wang - 2008 International Symposium on Electronic …, 2008 - ieeexplore.ieee.org
The secure payment gateway is necessary for ensuring the development of e-commerce.
The breaking down of hash algorithm of MD5 and the like have imposed great potential …

Hash functions in cryptography

JS Grah - 2008 - bora.uib.no
This thesis is concerned with giving both an overview of the application of hash functions in
cryptography and a presentation of today's standard cryptographic hash functions …

Faster multicollisions

JP Aumasson - International Conference on Cryptology in India, 2008 - Springer
Joux's multicollision attack is one of the most striking results on hash functions and also one
of the simplest: it computes ak-collision on iterated hashes in time ⌈\log_2k⌉⋅2^n/2 …

Two attacks on RadioGatún

D Khovratovich - Progress in Cryptology-INDOCRYPT 2008: 9th …, 2008 - Springer
We investigate the security of the hash function design called RadioGatún in a recently
proposed framework of sponge functions. We show that previously introduced symmetric …

Bent functions with stronger nonlinear properties: K-bent functions

NN Tokareva - Journal of Applied and Industrial Mathematics, 2008 - Springer
We introduce the notion of k-bent function, ie, a Boolean functionwith evennumber m of
variables υ 1,…, υ m which can be approximated with all functions of the form< u, v> j⊕ a in …