Sciweavers

126 search results - page 1 / 26
» SMASH - A Cryptographic Hash Function
Sort
View
FSE
2005
Springer
113views Cryptology» more  FSE 2005»
13 years 10 months ago
SMASH - A Cryptographic Hash Function
1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and...
Lars R. Knudsen
AC
1998
Springer
13 years 4 months ago
The State of Cryptographic Hash Functions
This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A...
Bart Preneel
SACRYPT
2005
Springer
125views Cryptology» more  SACRYPT 2005»
13 years 10 months ago
Breaking a New Hash Function Design Strategy Called SMASH
Norbert Pramstaller, Christian Rechberger, Vincent...
FSE
1993
Springer
148views Cryptology» more  FSE 1993»
13 years 9 months ago
Design Principles for Dedicated Hash Functions
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
Bart Preneel
12
Voted
JOC
1998
135views more  JOC 1998»
13 years 4 months ago
Attacks on Fast Double Block Length Hash Functions
The security of hash functions based on a block cipher with a block length of m bits and a key length of k bits, where k ≤ m, is considered. New attacks are presented on a large ...
Lars R. Knudsen, Xuejia Lai, Bart Preneel