LR Knudsen, C Rechberger, SS Thomsen - Fast Software Encryption: 14th …, 2007 - Springer
In this paper we propose the Grindahl hash functions, which are based on components of the Rijndael algorithm. To make collision search sufficiently difficult, this design has the …
H Tiwari, K Asawa - Egyptian Informatics Journal, 2012 - Elsevier
Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature …
C Ohtahara, Y Sasaki, T Shimoyama - IEICE Transactions on …, 2012 - search.ieice.org
In this paper, we present the first results on the preimage resistance against step-reduced versions of ISO standard hash functions RIPEMD-128 and RIPEMD-160, which were …
This paper advocates a new hash function family based on the HAIFA framework, inheriting built-in randomized hashing and higher security guarantees than the Merkle-Damgård …
T Peyrin - Advances in Cryptology–ASIACRYPT 2007: 13th …, 2007 - Springer
Due to recent breakthroughs in hash functions cryptanalysis, some new hash schemes have been proposed. Grindahl is a novel hash function, designed by Knudsen, Rechberger and …
G Leurent, L Wang - Annual International Conference on the Theory and …, 2015 - Springer
In this paper we study the security of summing the outputs of two independent hash functions, in an effort to increase the security of the resulting design, or to hedge against the …
Abstract We show that a 2 112.9 collision attack exists against the FORK-256 Hash Function. The attack is surprisingly simple compared to existing published FORK-256 cryptanalysis …
H Tiwari, K Asawa - European Journal of Scientific Research, 2010 - researchgate.net
Abstract Information is an important commodity in the world of Electronic communication. To achieve a secure communication between communicating parties, the protection of …
Y Sasaki, K Aoki - Information Security and Privacy: 14th Australasian …, 2009 - Springer
We describe preimage attacks on several double-branch hash functions. We first present meet-in-the-middle preimage attacks on RIPEMD, whose output length is 128 bits and …