×

Found 47 Documents (Results 1–47)

Verifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract). (English) Zbl 1517.94055

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13510, 33-56 (2022).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

The gap is sensitive to size of preimages: collapsing property doesn’t go beyond quantum collision-resistance for preimages bounded hash functions. (English) Zbl 1527.81040

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13509, 564-595 (2022).
PDFBibTeX XMLCite
Full Text: DOI

Collision-resistant and pseudorandom function based on Merkle-Damgård hash function. (English) Zbl 07628057

Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 325-338 (2022).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

\(T_5\): Hashing five inputs with three compression calls. (English) Zbl 07706056

Tessaro, Stefano (ed.), 2nd conference on information-theoretic cryptography. ITC 2021, July 23–26, 2021, virtual conference. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 199, Article 24, 23 p. (2021).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Double-block-length hash function for minimum memory size. (English) Zbl 1514.94120

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13092, 376-406 (2021).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Post-quantum security of the sponge construction. (English) Zbl 1426.81031

Lange, Tanja (ed.) et al., Post-quantum cryptography. 9th international conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9–11, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10786, 185-204 (2018).
MSC:  81P94 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

On the impact of known-key attacks on hash functions. (English) Zbl 1375.94149

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 59-84 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Breaking and fixing cryptophia’s short combiner. (English) Zbl 1378.94056

Gritzalis, Dimitris (ed.) et al., Cryptology and network security. 13th international conference, CANS 2014, Heraklion, Crete, Greece, October 22–24, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12279-3/pbk). Lecture Notes in Computer Science 8813, 50-63 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Cryptophia’s short combiner for collision-resistant hash functions. (English) Zbl 1330.94043

Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 136-153 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful. (English) Zbl 1314.94076

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 504-523 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Compression functions using a dedicated blockcipher for lightweight hashing. (English) Zbl 1365.94434

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 346-364 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Hash combiners for second pre-image resistance, target collision resistance and pre-image resistance have long output. (English) Zbl 1351.94059

Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 522-539 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Hash functions based on three permutations: a generic security analysis. (English) Zbl 1296.94132

Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 330-347 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

SPN-hash: improving the provable resistance against differential collision attacks. (English) Zbl 1304.94041

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 270-286 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new pseudorandom generator from collision-resistant hash functions. (English) Zbl 1292.94033

Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 187-202 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Black-box property of cryptographic hash functions. (English) Zbl 1302.94061

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 4th Canada-France MITACS workshop, FPS 2011, Paris, France, May 12–13, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27900-3/pbk). Lecture Notes in Computer Science 6888, 181-193 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Really fast syndrome-based hashing. (English) Zbl 1280.94039

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 134-152 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Analysis of message injection in stream cipher-based hash functions. (English) Zbl 1311.94093

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 498-513 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Universal one-way hash functions via inaccessible entropy. (English) Zbl 1280.94065

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 616-637 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Building a collision-resistant compression function from non-compressing primitives. (Extended abstract). (English) Zbl 1155.94387

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 643-654 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Amplifying collision resistance: a complexity-theoretic treatment. (English) Zbl 1215.94036

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 264-283 (2007).
MSC:  94A60 68P05 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Extended multi-property-preserving and ECM-construction. (English) Zbl 1153.94372

Srinathan, K. (ed.) et al., Progress in cryptology – INDOCRYPT 2007. 8th international conference on cryptology in India, Chennai, India, December 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77025-1/pbk). Lecture Notes in Computer Science 4859, 361-372 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Discrete logarithm variants of VSH. (English) Zbl 1295.94103

Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 229-242 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Multi-property-preserving hash domain extension and the EMD transform. (English) Zbl 1172.94561

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 299-314 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of a SHA-256 variant. (English) Zbl 1151.94589

Preneel, Bart (ed.) et al., Selected areas in cryptography. 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11–12, 2005. Revised selected papers. Berlin: Springer (ISBN 978-3-540-33108-7/pbk). Lecture Notes in Computer Science 3897, 245-260 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Collision-resistant no more: Hash-and-Sign paradigm revisited. (English) Zbl 1151.94547

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 140-156 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. (English) Zbl 1079.68560

Roy, Bimal (ed.) et al., Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5–7, 2004. Revised papers. Berlin: Springer (ISBN 3-540-22171-9/pbk). Lecture Notes in Computer Science 3017, 371-388 (2004).
MSC:  68P25 94A60 68N99
PDFBibTeX XMLCite
Full Text: DOI

Incremental multiset hash functions and their application to memory integrity checking. (English) Zbl 1205.94079

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 188-207 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software