• No results found

Security of cryptographic hash functions

Cube attacks on cryptographic hash functions

Cube attacks on cryptographic hash functions

... the cryptographic community was improving the speed of the MD5 attack, others were devising ways of applying it to demon- strate new weaknesses in computer security ...

66

On  the  Indifferentiability  of  the  Integrated-Key  Hash  Functions

On the Indifferentiability of the Integrated-Key Hash Functions

... Cryptographic hash functions are the workhorses of ...the hash function literature is how to formally argue about the security of a hash function without the presence of keys ...

27

Bad  directions  in  cryptographic  hash  functions

Bad directions in cryptographic hash functions

... There are, however, two critical caveats. First, it is not at all clear that the Obf proposal from [25] (or any newer proposal) will survive cryptanalysis. There are actually two alternative proposals in [25]: the first ...

27

Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata

Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata

... given hash func- tion has a good cryptographic level of ...A hash function that behaves like a pseudo- random function and satisfies the avalanche ef- fect is generally considered to be secure and ...

12

A  Low-Area  Unified  Hardware  Architecture  for  the  AES   and  the  Cryptographic  Hash  Function  Grøstl

A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl

... Since the SHA-3 finalist Grøstl [13] is strongly inspired by the Advanced Encryption Standard (AES) [11], it is tempting to design a compact unified hardware architecture which supports both algorithms. Such an ...

14

High Speed FPGA Implementation of Cryptographic Hash Function

High Speed FPGA Implementation of Cryptographic Hash Function

... The hash functions in use today evolved from weaknesses found in previous hash ...known hash function was developed by Ronald Rivest in 1989 and it was known as Message-Digest Algorithm ...

65

The  Cryptographic  Hardness  of  Random  Local  Functions --  Survey

The Cryptographic Hardness of Random Local Functions -- Survey

... computable hash function H 0 with polynomial shrinkage factor of m = n ε for an arbitrary constant ε > 0 (the i-th level of the circuit contains O(n/2 i ) ...a hash function can be used to obtain ...

35

How to Break MD5 and Other Hash Functions

How to Break MD5 and Other Hash Functions

... used cryptographic hash func- tions ...its security was widely studied since then by several ...the hash function is replaced by a non-standard value, which is the result of the ...other ...

17

A  mathematical  problem  for  security  analysis  of  hash  functions   and  pseudorandom  generators

A mathematical problem for security analysis of hash functions and pseudorandom generators

... two cryptographic topics; theoretical security evaluations of keyless hash functions (such as SHA-1), and constructions of provably secure pseudorandom generators (PRGs) with some enhanced ...

19

Faster  Cryptographic  Hash  Function  From  Supersingular  Isogeny  Graphs

Faster Cryptographic Hash Function From Supersingular Isogeny Graphs

... secure hash functions are based on expander ...expander hash, called CGL, which is based on the isogeny graph of supersingular elliptic curves over finite ...The security of CGL is based on ...

20

A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System

A Fast New Cryptographic Hash Function Based on Integer Tent Mapping System

... one-way Hash function which is based on the Coupled Integer Tent Mapping System and termed as THA (THA-160, ...logic functions are replaced by the integer tent map, and so the scheme has ideal properties of ...

10

Overview of blockchain technology cryptographic security

Overview of blockchain technology cryptographic security

... The security of blockchain technology covers a broad range of topics which can fall into many different categories such as physical security, network security, internet security, cloud ...

58

On  the  Real-World  Instantiability  of  Admissible  Hash  Functions   and  Efficient  Verifiable  Random  Functions

On the Real-World Instantiability of Admissible Hash Functions and Efficient Verifiable Random Functions

... Admissible hash functions (AHFs) are a generic and very useful tool to en- able partitioning proofs in the standard model, that is, without random ...numerous cryptographic primitives with strong ...

36

Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm

Design of RSA Digital Signature Scheme Using A Novel Cryptographic Hash Algorithm

... the security point of view the ASH160 is stronger than the SHA1 and RIPEMD160 ...existing hash algorithms by introducing new mathematical functions which takes less CPU time and withstand against ...

5

On  the  Impact  of  Known-Key  Attacks  on  Hash  Functions

On the Impact of Known-Key Attacks on Hash Functions

... provable security point of view. It is a step in the direction of security beyond the ideal model, connecting practical attacks from cryptanalysis with ideal model provable ...

38

Homomorphic Signatures from Chameleon Hash Functions

Homomorphic Signatures from Chameleon Hash Functions

... Cloud computing enables users to store sensitive data in the untrusted sever and sometimes the untrusted cloud requires to perform computations on them. The privacy of data and the authentication of computation are two ...

13

Adversarially  Robust  Property  Preserving  Hash  Functions

Adversarially Robust Property Preserving Hash Functions

... linear functions with sparse domains, restricting the input to be vectors of weight ≤ βn for constant β < 1/2, and so Gaussian elim- ination no longer works; and (2) building on this, we extend this to a ...

53

Backdoored  Hash  Functions:  Immunizing  HMAC   and  HKDF

Backdoored Hash Functions: Immunizing HMAC and HKDF

... sponge-based hash function we cannot directly apply the same “trick” as described in Section 7 for backdooring Merkle-Damgård-based hash functions, where both the backdoor and the digest could enter ...

31

Security in Cloud Computing  Hash Function

Security in Cloud Computing Hash Function

... Client sends the data to the server which is known as Main Server. At the same time data is also back up to Multi Servers. In this method for data backup it involve with three Multi Server such as (SA 1(Server, ...

5

Ensuring Confidentiality in Cryptographic Protocols with the Witness-Functions

Ensuring Confidentiality in Cryptographic Protocols with the Witness-Functions

... In this paper, we presented a new framework for verifying cryptographic protocols statically using the witness-functions for the property of confidentiality. We tested them on the lawed version of the ...

15

Show all 10000 documents...

Related subjects