Sciweavers

434 search results - page 5 / 87
» Logical Analysis of Hash Functions
Sort
View
FSE
2010
Springer
147views Cryptology» more  FSE 2010»
15 years 2 months ago
Security Analysis of the Mode of JH Hash Function
Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nan...
JISE
2008
64views more  JISE 2008»
14 years 9 months ago
Analysis of All-or-Nothing Hash Functions
Pin Lin, Wenling Wu, Chuankun Wu, Tian Qiu
121
Voted
ACNS
2011
Springer
254views Cryptology» more  ACNS 2011»
14 years 1 months ago
Linear Analysis of Reduced-Round CubeHash
Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
Tomer Ashur, Orr Dunkelman
83
Voted
WG
1993
Springer
15 years 1 months ago
Graphs, Hypergraphs and Hashing
Minimal perfect hash functions are used for memory efficient storage and fast retrieval of items from static sets. We present an infinite family of efficient and practical algori...
George Havas, Bohdan S. Majewski, Nicholas C. Worm...
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
15 years 1 months ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin