Sciweavers

183 search results - page 2 / 37
» The State of Cryptographic Hash Functions
Sort
View
FSE
2005
Springer
113views Cryptology» more  FSE 2005»
13 years 11 months ago
SMASH - A Cryptographic Hash Function
1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and...
Lars R. Knudsen
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
13 years 11 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger
IJNSEC
2006
81views more  IJNSEC 2006»
13 years 5 months ago
Small Size Hashes with Enhanced Security
This paper contains techniques for enhancing the strength of any cryptographic hash function. For an "ideal", traditional hash function with an m-bit result, the complex...
Lars R. Knudsen
CRYPTO
2004
Springer
108views Cryptology» more  CRYPTO 2004»
13 years 11 months ago
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
Many cryptographic primitives begin with parameter generation, which picks a primitive from a family. Such generation can use public coins (e.g., in the discrete-logarithm-based c...
Chun-Yuan Hsiao, Leonid Reyzin
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
13 years 11 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier