Sciweavers

183 search results - page 2 / 37
» The State of Cryptographic Hash Functions
Sort
View
FSE
2005
Springer
113views Cryptology» more  FSE 2005»
15 years 4 months ago
SMASH - A Cryptographic Hash Function
1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and...
Lars R. Knudsen
EUROCAST
2007
Springer
108views Hardware» more  EUROCAST 2007»
15 years 5 months ago
A Systems Theoretic Approach to the Design of Scalable Cryptographic Hash Functions
Cryptographic hash functions are security primitives that compute check sums of messages in a strong manner and this way are of fundamental importance for ensuring integrity and au...
Josef Scharinger
IJNSEC
2006
81views more  IJNSEC 2006»
14 years 11 months ago
Small Size Hashes with Enhanced Security
This paper contains techniques for enhancing the strength of any cryptographic hash function. For an "ideal", traditional hash function with an m-bit result, the complex...
Lars R. Knudsen
CRYPTO
2004
Springer
108views Cryptology» more  CRYPTO 2004»
15 years 4 months ago
Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?
Many cryptographic primitives begin with parameter generation, which picks a primitive from a family. Such generation can use public coins (e.g., in the discrete-logarithm-based c...
Chun-Yuan Hsiao, Leonid Reyzin
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
15 years 4 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier