Sciweavers

53 search results - page 11 / 11
» Cryptanalysis of the GOST Hash Function
Sort
View
FSE
2005
Springer
116views Cryptology» more  FSE 2005»
13 years 11 months ago
Narrow T-Functions
T-functions were introduced by Klimov and Shamir in a series of papers during the last few years. They are of great interest for cryptography as they may provide some new building ...
Magnus Daum
IACR
2011
177views more  IACR 2011»
12 years 6 months ago
New attacks on Keccak-224 and Keccak-256
The Keccak hash function is one of the five finalists in NIST’s SHA-3 competition, and so far it showed remarkable resistance against practical collision finding attacks: Afte...
Itai Dinur, Orr Dunkelman, Adi Shamir
ASIACRYPT
2001
Springer
13 years 10 months ago
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
A Zero-knowledge protocol provides provably secure entity authentication based on a hard computational problem. Among many schemes proposed since 1984, the most practical rely on f...
Nicolas Courtois