Sciweavers

434 search results - page 3 / 87
» Logical Analysis of Hash Functions
Sort
View
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
13 years 11 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
PKC
1998
Springer
158views Cryptology» more  PKC 1998»
13 years 10 months ago
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation
One-way hash functions are an important tool in achieving authentication and data integrity. The aim of this paper is to propose a novel one-way hash function based on cellular aut...
Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
ACISP
2010
Springer
13 years 7 months ago
Distinguishers for the Compression Function and Output Transformation of Hamsi-256
Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future hash standard SHA-3. Until now, little analysis has been published on its resistance to diffe...
Jean-Philippe Aumasson, Emilia Käsper, Lars R...
ICAPR
2005
Springer
13 years 11 months ago
Symmetric Hash Functions for Fingerprint Minutiae
Abstract. The possibility that a database with biometric data is compromised is one of the main concerns in implementing biometric identification systems. In this paper we present...
Sergey Tulyakov, Faisal Farooq, Venu Govindaraju
ICISC
2007
152views Cryptology» more  ICISC 2007»
13 years 7 months ago
Analysis of Multivariate Hash Functions
We analyse the security of new hash functions whose compression function is explicitly defined as a sequence of multivariate equations. First we prove non-universality of certain ...
Jean-Philippe Aumasson, Willi Meier