搜索结果: 1-15 共查到“军事学 Compression Function”相关记录16条 . 查询时间(0.125 秒)
A Tweak for a PRF Mode of a Compression Function and Its Applications
compression function MAC pseudorandom function
font style='font-size:12px;'>
2016/6/22
We discuss a tweak for the domain extension called Merkle-Damg錼d with Permutation (MDP), which was presented at ASIACRYPT 2007. We first show that MDP may produce multiple independent pseudorandom fun...
Provable Security of BLAKE with Non-Ideal Compression Function
secret-key cryptography / SHA-3 BLAKE collision resistance
font style='font-size:12px;'>
2012/6/14
We analyze the security of the SHA-3 finalist BLAKE. The BLAKE hash function follows the HAIFA design methodology, and as such it achieves optimal preimage, second preimage and collision resistance, a...
Provable Security of BLAKE with Non-Ideal Compression Function
secret-key cryptography / SHA-3 BLAKE collision resistance (second) preimage resistance indifferentiability
font style='font-size:12px;'>
2012/3/22
We analyze the security of the SHA-3 finalist BLAKE. The BLAKE hash function follows the HAIFA design methodology, and as such it achieves optimal preimage, second preimage and collision resistance, a...
Provable Security of BLAKE with Non-Ideal Compression Function
secret-key cryptography / SHA-3, BLAKE collision resistance (second) preimage resistance indifferentiability
font style='font-size:12px;'>
2012/3/21
We analyze the security of the SHA-3 finalist BLAKE. The BLAKE hash function follows the HAIFA design methodology, and as such it achieves optimal preimage, second preimage and collision resistance, a...
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256
Hash function Skein SHA-3
font style='font-size:12px;'>
2012/3/29
The Hash function Skein is one of the 5 finalists of NIST SHA-3 competition. It is designed based on the threefish block cipher and it only uses three primitive operations: modular addition, rotation ...
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
Cryptanalysis Hash Functions SHA-3 ECHO-256 Collision attack
font style='font-size:12px;'>
2010/11/10
In this paper, we present new results on the second-round SHA-3 candidate ECHO. We describe a method to construct a collision in the compression function of ECHO-256 reduced to four rounds in 2^52 ope...
Cryptanalysis of the Compression Function of SIMD
SIMD SHA-3 Candidate near collision distinguishing attack
font style='font-size:12px;'>
2010/7/13
SIMD is one of the second round candidates of the SHA-3 competition hosted by NIST. In this paper, we present some results on the compression function of SIMD 1.1 (the tweaked version) using the modul...
Differential Distinguishers for the Compression Function and Output Transformation of Hamsi-256
hash functions differential cryptanalysis SHA-3
font style='font-size:12px;'>
2010/3/16
Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future
hash standard SHA-3. Until now, little analysis has been published on its resistance to dierential cryptanalysis, th...
Message Recovery and Pseudo-Preimage Attacks on the Compression Function of Hamsi-256
Hash functions SHA-3 competition cryptanalysis
font style='font-size:12px;'>
2010/2/20
Hamsi is one of the second round candidates of the SHA-3
competition. In this study, we present non-random differential properties
for the compression function of the hash function Hamsi-256. Based
...
Rebound Attack on the Full Lane Compression Function
SHA-3 LANE hash function
font style='font-size:12px;'>
2009/9/27
In this work, we apply the rebound attack to the AES based
SHA-3 candidate Lane. The hash function Lane uses a permutation
based compression function, consisting of a linear message expansion
and 6...
Rebound Attack on the Full Lane Compression Function
SHA-3 LANE hash function
font style='font-size:12px;'>
2009/9/22
In this work, we apply the rebound attack to the AES based
SHA-3 candidate Lane. The hash function Lane uses a permutation
based compression function, consisting of a linear message expansion
and 6...
On the Randomness and Regularity of Reduced EDON-R Compression Function
hash function randomness regularity balance
font style='font-size:12px;'>
2009/6/15
EDON-R is one of the candidate hash functions for the ongoing NIST competition for the next cryptographic hash standard
called SHA-3. Its construction is based on algebraic properties of non-commutat...
Near-Collision Attack on the Compression Function of Dynamic SHA2
Near-Collision Attack Compression Function Dynamic SHA2
font style='font-size:12px;'>
2009/6/12
In this paper, we present a near-collision attack on the compression
functions of Dynamic SHA2 for all the output sizes. For the
Dynamic SHA2-224/256, the complexity is about 245 operations and for
...
Weaknesses of the FORK-256 compression function
FORK-256 compression function
font style='font-size:12px;'>
2008/12/18
This report presents analysis of the compression function of
a recently proposed hash function, FORK-256. We exhibit some unex-
pected differentials existing for the step transformation and show th...
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
Hash function Random oracle Ideal cipher model
font style='font-size:12px;'>
2008/6/30
In this paper, we introduce new compression function design
principles supporting variable output lengths (multiples of size n). They
are based on a function or block cipher with an n-bit output siz...