Sciweavers

40 search results - page 2 / 8
» Some Plausible Constructions of Double-Block-Length Hash Fun...
Sort
View
INDOCRYPT
2005
Springer
13 years 10 months ago
Towards Optimal Double-Length Hash Functions
In this paper we design several double length hash functions and study their security properties in the random oracle model. We design a class of double length hash functions (and ...
Mridul Nandi
IEEEIAS
2009
IEEE
13 years 11 months ago
One-way Hash Function Construction Based on Conservative Chaotic Systems
: An algorithm for one-way hash function construction based on conservative chaotic system is proposed. The plaintext is divided into a group of message blocks by a fixed length an...
Qing-hua Zhang, Han Zhang, Zhao-hui Li
CISC
2007
Springer
111views Cryptology» more  CISC 2007»
13 years 11 months ago
Multivariates Polynomials for Hashing
We propose the idea of building a secure hash using quadratic or higher degree multivariate polynomials over a finite field as the compression function. We analyze some security ...
Jintai Ding, Bo-Yin Yang
TISSEC
2010
115views more  TISSEC 2010»
12 years 11 months ago
A Simple and Generic Construction of Authenticated Encryption with Associated Data
We revisit the problem of constructing a protocol for performing authenticated encryption with associated data (AEAD). A technique is described which combines a collision resistant...
Palash Sarkar
AC
1998
Springer
13 years 4 months ago
The State of Cryptographic Hash Functions
This paper describes the state of the art for cryptographic hash functions. Different definitions are compared, and the few theoretical results on hash functions are discussed. A...
Bart Preneel