搜索结果: 1-5 共查到“密码学 iterated hash functions”相关记录5条 . 查询时间(0.203 秒)
In this paper,we proposed a efficient and laconic mode for iterative hash functions and tried to fix the flaws of the Merkle-Damgaard construction completely and certainly tried to prevent varieties o...
An Automata-Theoretic Interpretation of Iterated Hash Functions - Application to Multicollisions
Automata-Theoretic Interpretation Iterated Hash Functions Multicollisions
2009/9/27
In this paper we present a new method of constructing multi-
collision sets for iterated hash functions. Multicollisions have been stud-
ied quite actively since Joux published an attack against ite...
An Automata-Theoretic Interpretation of Iterated Hash Functions - Application to Multicollisions
Automata-Theoretic Interpretation Iterated Hash Functions Multicollision
2009/9/22
In this paper we present a new method of constructing multi-
collision sets for iterated hash functions. Multicollisions have been stud-
ied quite actively since Joux published an attack against ite...
This paper deals with the security of iterated hash functions
against generic attacks, such as, e.g., Joux' multicollision attacks from
Crypto 04 [6]. The core idea is to increase the size of the in...
Second Preimages for Iterated Hash Functions Based on a b-Block Bypass
iterated hash functions double block-length hash functions differential cryptanalysis
2008/11/11
In this article, we present a second preimage attack on a
double block-length hash proposal presented at FSE 2006. If the hash
function is instantiated with DESX as underlying block cipher, we are
...