Provably secure cryptographic hash function

Results: 30



#Item
1SHA-2 / Collision attack / MD5 / Preimage attack / MD4 / Cryptanalysis / Collision / Hash function / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / SHA-1

Improving Local Collisions: New Attacks on Reduced SHA-256? Florian Mendel, Tomislav Nad, Martin Schl¨affer IAIK, Graz University of Technology, Austria

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-20 04:23:58
2Hashing / Search algorithms / SHA-2 / Collision resistance / Collision attack / Fast Fourier transform / Hash function / MD4 / SWIFFT / Cryptography / Cryptographic hash functions / Preimage attack

Preimage Attacks On Provably Secure FFT Hashing proposed at Second Hash Workshop in 2006 Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-04 19:34:48
3Hashing / Artificial intelligence / Information retrieval / Hash function / Hash table / MD5 / Collision / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Search algorithms

Time-memory Trade-offs for Near-collisions Gaëtan Leurent UCL Crypto Group Abstract. In this work we consider generic algorithms to find near-collisions for a hash

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-31 14:07:22
4Claw-free permutation / MD5 / One-way function / Universal one-way hash function / SHA-1 / Provably secure cryptographic hash function / Elliptic curve only hash / Cryptographic hash functions / Cryptography / Hash function

An abridged version of this paper appears in Advances in Cryptology { Eurocrypt 97 Proceedings, Lecture Notes in Computer Science Vol. 1233, W. Fumy ed., Springer-Verlag, 1997. A New Paradigm for Collision-free Hashing:

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 1998-07-30 12:00:14
5Block cipher / Cryptographic hash function / Advanced Encryption Standard / Cryptography / Message authentication codes / CBC-MAC

Provably Secure MACs from Differentially-uniform Permutations and AES-based Implementations Kazuhiko Minematsu and Yukiyasu Tsunoo NEC Corporation

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2006-04-18 10:40:57
6Mathematics / Search algorithms / Multiset / Hash function / Collision resistance / MD5 / SHA-1 / Collision / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking Dwaine Clarke? , Srinivas Devadas, Marten van Dijk?? , Blaise Gassend, G. Edward Suh MIT Computer Science and Artificial Intelligence

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
7Hashing / Search algorithms / Keccak / SHA-2 / Hash function / SHA-1 / Password / Salt / NIST hash function competition / Cryptography / Cryptographic hash functions / Error detection and correction

Pleco and Plectron – Two Provably Secure Password Hashing Algorithms Bo Zhu, Xinxin Fan, and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {bo.zhu,x5fan,ggong}@uwaterloo.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-12 12:07:46
8Error detection and correction / Search algorithms / Random oracle / Hash tree / Hash function / Hash chain / Oracle machine / Hash list / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

Security Proofs for the BLT Signature Scheme Ahto Buldas, Risto Laanoja, and Ahto Truu GuardTime AS, Tammsaare tee 60, 11316 Tallinn, Estonia. Abstract. We present security proofs for the BLT signature scheme in the mode

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-04 03:31:48
9Crypt / RadioGatún / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hash function

X-Sieve: CMU Sieve 2.2 Subject: Comments on Hash Function Criteria Date: Fri, 27 Apr[removed]:28:[removed]X-MS-Has-Attach: yes X-MS-TNEF-Correlator: Thread-Topic: Comments on Hash Function Criteria

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 08:24:16
10Search algorithms / Hash function / Information retrieval / Artificial intelligence / Information science / Provably secure cryptographic hash function / Cryptographic hash functions / Cryptography / Hashing

X-Sieve: CMU Sieve 2.2 From: Tolga Acar To: "hash-function@nist.gov" CC: Brian LaMacchia Date: Fri, 27 Apr 2007 15:44:15 -0700 Subject: Has

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-06-20 09:55:18
UPDATE