One-way compression function

Results: 80



#Item
11Random oracle / Preimage attack / Hash function / MDC-2 / Merkle–Damgård construction / SHA-1 / Oracle machine / SHA-2 / Advantage / Cryptography / Cryptographic hash functions / One-way compression function

A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions∗ Zheng Gong, Xuejia Lai and Kefei Chen Department of Computer Science and Engineering Shanghai Jiaotong University, China neoyan@sjtu.e

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-08-12 04:16:52
12SHA-2 / SHA-1 / Hash function / Preimage attack / MD5 / MD4 / RIPEMD / NIST hash function competition / One-way compression function / Cryptographic hash functions / Error detection and correction / Cryptography

Dynamic SHA Zijie Xu E-mail: Abstract. In this paper I describe the construction of Dynamic SHA family of cryptographic hash functions. They are built with design

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-20 08:25:40
13Block cipher / Hash function / Collision attack / One-way compression function / Index of cryptography articles / Cryptography / Cryptographic hash functions / Error detection and correction

Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-24 08:27:19
14Search algorithms / One-way compression function / Merkle–Damgård construction / MD5 / Preimage attack / Hash function / Cryptography / Cryptographic hash functions / Hashing

Revised: Block Cipher Based Hash Function Construction From PGV Duo Lei, Guozhu Feng , Li Chao , and RuiLin Li Department of Science, National University of Defense Technology,Changsha, China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-08-11 22:39:37
15SHACAL / SHA-1 / Ciphertext / NIST hash function competition / Index of cryptography articles / One-way compression function / Cryptography / Cryptographic hash functions / Block ciphers

Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de Abstract. In this note we discuss some observation of the SHA-3 candida

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-11-27 07:11:39
16SHA-1 / SHA-2 / Hash function / Block cipher modes of operation / Block cipher / Authenticated encryption / Ciphertext indistinguishability / One-way compression function / Index of cryptography articles / Cryptography / Error detection and correction / Cryptographic hash functions

COFFE: Ciphertext Output Feedback Faithful Encryption On-Line Authenticated Encryption Without a Block Cipher Christian Forler1⋆ , David McGrew2 , Stefan Lucks1 , and Jakob Wenzel1 1 Bauhaus-University Weimar, Germany

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-17 05:30:49
17Advanced Encryption Standard / SHA-1 / MD4 / Collision attack / Stream cipher / One-way compression function / Index of cryptography articles / Cryptography / Cryptographic hash functions / Block cipher

Do We Need to Vary the Constants? Methodological Investigation of Block-Cipher Based Hash Functions Donghoon Chang1 and Moti Yung2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-11 13:21:29
18Block cipher / Hash function / One-way compression function / Merkle–Damgård construction / Cryptography / Cryptographic hash functions / Collision attack

A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions Donghoon Chang Center for Information Security Technologies(CI

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-21 12:10:24
19Error detection and correction / Hash function / One-way compression function / Elliptic curve only hash / Cryptography / Cryptographic hash functions / Hashing

CS255: Cryptography and Computer Security Winter 2003 Assignment #2 Due: Wednesday, February 19th, 2003.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2003-02-14 22:08:35
20RSA / Ciphertext / Block cipher / Padding / Message authentication codes / One-way compression function / Ciphertext stealing / Cryptography / Public-key cryptography / Electronic commerce

CS255: Cryptography and Computer Security Winter 2015 Assignment #2 Due: Monday, Feb. 23, 2015, in class.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-11 11:47:35
UPDATE