Limited-birthday distinguishers for hash functions: Collisions beyond the birthday bound can be meaningful

M Iwamoto, T Peyrin, Y Sasaki - … Conference on the Theory and Application …, 2013 - Springer
In this article, we investigate the use of limited-birthday distinguishers to the context of hash
functions. We first provide a proper understanding of the limited-birthday problem and …

Improved cryptanalysis of reduced RIPEMD-160

F Mendel, T Peyrin, M Schläffer, L Wang… - Advances in Cryptology …, 2013 - Springer
In this article, we propose an improved cryptanalysis of the double-branch hash function
standard RIPEMD-160. Using a carefully designed non-linear path search tool, we study the …

Cryptanalysis of full RIPEMD-128

F Landelle, T Peyrin - Advances in Cryptology–EUROCRYPT 2013: 32nd …, 2013 - Springer
In this article we propose a new cryptanalysis method for double-branch hash functions that
we apply on the standard RIPEMD-128, greatly improving over know results. Namely, we …

Generic state-recovery and forgery attacks on ChopMD-MAC and on NMAC/HMAC

Y Naito, Y Sasaki, L Wang, K Yasuda - Advances in Information and …, 2013 - Springer
This paper presents new attacks on message authentication codes (MACs). Our attacks are
generic and applicable to (secret-prefix) ChopMD-MAC and to NMAC/HMAC, all of which …

Allowing non-identifying information disclosure in citizen opinion evaluation

F Buccafurri, L Fotia, G Lax - … on Electronic Government and the Information …, 2013 - Springer
The continuous participation of citizens in the decisional processes of the community
through the submission of their opinions is a key factor of e-democracy. To do this, it appears …

Bitcoin Protocol: Model of 'Cryptographic Proof'Based Global Crypto-Currency & Electronic Payments System

Y Malhotra - Available at SSRN 2911623, 2013 - papers.ssrn.com
This is the first research report with specific technical focus on cryptographic 'proof of work'in
the context of virtual crypto-currencies such as Bitcoin. Situated somewhere along the …

[图书][B] Kryptographie in C und C++: zahlentheoretische Grundlagen, Computer-Arithmetik mit großen Zahlen, kryptographische Tools

M Welschenbach - 2013 - books.google.com
Das Buch bietet einen umfassenden Überblick über die Grundlagen moderner
kryptographischer Verfahren und ihre programmtechnische Entwicklung mit Hilfe einer …

[PDF][PDF] Architecture based on MD5 and MD5-512 Bit Applications

V Pandey, VK Mishra - International Journal of Computer …, 2013 - researchgate.net
Researchers have found many flaws in hash function such as MD5 algorithm. It has been
one of the most widely used hash algorithm and it has been indicated that there is a security …

[图书][B] A novel method for watermarking sequential circuits

M Lewandowski - 2013 - search.proquest.com
Abstract We present an Intellectual Property (IP) protection technique for sequential circuits
driven by embedding a decomposed signature into a Finite State Machine (FSM) through …

Seamless MANET autoconfiguration through enhanced 802.11 beaconing

MJ Villanueva, CT Calafate, A Torres… - Mobile Information …, 2013 - Wiley Online Library
The deployment of mobile ad‐hoc networks involves several configuration steps, which
complicate research efforts and hinder user interest. This problem prompts for new …