loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Lars R. Knudsen and Søren S. Thomsen

Affiliation: Technical University of Denmark, Denmark

Keyword(s): Cryptographic hash functions, Merkle-Damga˚rd constructions, multi-collisions, birthday attacks.

Related Ontology Subjects/Areas/Topics: Cryptographic Techniques and Key Management ; Information and Systems Security ; Public Key Crypto Applications

Abstract: The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned into constructions of our proposed type.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.116.85.72

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
R. Knudsen, L. and S. Thomsen, S. (2006). PROPOSALS FOR ITERATED HASH FUNCTIONS. In Proceedings of the International Conference on Security and Cryptography (ICETE 2006) - SECRYPT; ISBN 978-972-8865-63-4; ISSN 2184-3236, SciTePress, pages 246-253. DOI: 10.5220/0002102102460253

@conference{secrypt06,
author={Lars {R. Knudsen}. and Søren {S. Thomsen}.},
title={PROPOSALS FOR ITERATED HASH FUNCTIONS},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2006) - SECRYPT},
year={2006},
pages={246-253},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002102102460253},
isbn={978-972-8865-63-4},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2006) - SECRYPT
TI - PROPOSALS FOR ITERATED HASH FUNCTIONS
SN - 978-972-8865-63-4
IS - 2184-3236
AU - R. Knudsen, L.
AU - S. Thomsen, S.
PY - 2006
SP - 246
EP - 253
DO - 10.5220/0002102102460253
PB - SciTePress