نتایج جستجو برای: the tillich zemor hash function

تعداد نتایج: 16181744  

2009
Yiyuan Luo Xuejia Lai

Multivariate hash functions are a type of hash functions whose compression function is explicitly defined as a sequence of multivariate equations. Olivier Billet etc. have designed the hash function MQ-HASH and Jintai Ding etc. also propose a similar construction, which the security depends on the difficulty of solving randomly drawn systems of multivariate equations over a finite field. Findin...

2008
Florian Mendel Norbert Pramstaller Christian Rechberger

In this article, we analyze the security of the GOST hash function with respect to (second) preimage resistance. The GOST hash function, defined in the Russian standard GOST-R 34.11-94, is an iterated hash function producing a 256-bit hash value. As opposed to most commonly used hash functions such as MD5 and SHA-1, the GOST hash function defines, in addition to the common iterated structure, a...

2012
Meltem Sönmez Turan

Hash functions are fundamental components of many cryptographic applications. Due to the recent attacks on classical designs, alternative design approaches are proposed. In this paper, we give a survey for hash function constructions based stream ciphers mainly concentrating on Panama, RadioGatún and RC4-hash. Also, we propose an example hash function Dragon-Hash based on the stream cipher Dragon.

Journal: :Science China Information Sciences 2010

Journal: :IACR Cryptology ePrint Archive 2005
Praveen Gauravaram William Millan Juan Manuel González Nieto Ed Dawson

We propose a new cryptographic construction called 3C, which works as a pseudorandom function (PRF), message authentication code (MAC) and cryptographic hash function. The 3Cconstruction is obtained by modifying the Merkle-Damg̊ard iterated construction used to construct iterated hash functions. We assume that the compression functions of Merkle-Damg̊ard iterated construction realize a family of ...

2017
Jan Camenisch David Derler Stephan Krenn Henrich Christopher Pöhls Kai Samelin Daniel Slamanig

A chameleon-hash function is a hash function that involves a trapdoor the knowledge of which allows one to find arbitrary collisions in the domain of the function. In this paper, we introduce the notion of chameleon-hash functions with ephemeral trapdoors. Such hash functions feature additional, i.e., ephemeral, trapdoors which are chosen by the party computing a hash value. The holder of the m...

2008
A.Arul Lawrence Selvakumar

This paper describes the study of cryptographic hash functions, one of the most important classes of primitives used in recent techniques in cryptography. The main aim is the development of recent crypt analysis hash function. We present different approaches to defining security properties more formally and present basic attack on hash function. The Main aim of this paper is the development of ...

1993
Ivan Damgård Lars R. Knudsen

The AR hash function has been proposed by Algorithmic Research Ltd and is currently being used in practice in the German banking world. AR hash is based on DES and a variant of the CBC mode. It produces a 128 bit hash value. In this paper, we present two attacks on AR hash. The rst one constructs in one DES encryption two messages with the same hash value. The second one nds, given an arbitrary...

1996
K. M. HO C. J. WANG

1 2 m 1 2 k 1 2 n Hash bin address in binary hash Key Compress to a shorter binary code Figure 1: Architecture of Neuro-Hasher consists of a two layer feedforward neural net. The generic function of a feedforward multilayer perceptron (MLP) network is to map patterns from one space to another. This mapping function, determined by the set of examples used to train the network, may be viewed as a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید