New proofs for NMAC and HMAC: Security without collision resistance

M Bellare - Journal of Cryptology, 2015 - Springer
HMAC was proved in Bellare et al.(Advances in Cryptology–CRYPTO'96, Springer, Berlin,
Heidelberg, 1996) to be a PRF assuming that (1) the underlying compression function is a …

Robust watermarking method in DFT domain for effective management of medical imaging

M Cedillo-Hernandez, F Garcia-Ugalde… - Signal, Image and Video …, 2015 - Springer
In general, management of medical data is achieved by several issues of medical
information such as authentication, security, integrity, privacy, among others. Because …

Feedback based reputation on top of the bitcoin blockchain

D Carboni - arXiv preprint arXiv:1502.01504, 2015 - arxiv.org
The ability to assess the reputation of a member in a web community is a need addressed in
many different ways according to the many different stages in which the nature of …

Beyond Bitcoin-Part I: A critical look at blockchain-based systems

P Forte, D Romano, G Schmid - Cryptology ePrint Archive, 2015 - eprint.iacr.org
After more than six years from the launch of Bitcoin, it has become ev-ident that the
decentralized transaction ledger functionality implemented through the blockchain …

Security and practical considerations when implementing the elliptic curve integrated encryption scheme

V Gayoso Martínez, L Hernández Encinas… - Cryptologia, 2015 - Taylor & Francis
The most popular encryption scheme based on elliptic curves is the Elliptic Curve Integrated
Encryption Scheme (ECIES), which is included in ANSI X9. 63, IEEE 1363a, ISO/IEC 18033 …

Open problems in hash function security

E Andreeva, B Mennink, B Preneel - Designs, Codes and Cryptography, 2015 - Springer
A cryptographic hash function compresses arbitrarily long messages to digests of a short
and fixed length. Most of existing hash functions are designed to evaluate a compression …

Digital document signing: Vulnerabilities and solutions

G Lax, F Buccafurri, G Caminiti - Information Security Journal: A …, 2015 - Taylor & Francis
Digital signature is the key issue in a number of innovative processes, such as
dematerialization, e-government, e-commerce, and e-banking. Digital signature ensures …

The sum can be weaker than each part

G Leurent, L Wang - Annual International Conference on the Theory and …, 2015 - Springer
In this paper we study the security of summing the outputs of two independent hash
functions, in an effort to increase the security of the resulting design, or to hedge against the …

Cryptanalysis of SHA-0 and Reduced SHA-1

E Biham, R Chen, A Joux - Journal of Cryptology, 2015 - Springer
We present new techniques for the cryptanalysis of hash functions. Our contributions are two-
fold: both on the search level of the compression function and on the meta-structure. The …

An evaluation of the effects of broken cryptographic primitives on bitcoin

I Giechaskiel - 2015 - ora.ox.ac.uk
The Bitcoin cryptocurrency relies heavily on a variety of cryptographic functions and
operations, which are currently assumed to be secure, but will inevitably be broken in the …