[PDF][PDF] Cryptographic hash functions: a review

R Sobti, G Geetha - International Journal of Computer Science Issues …, 2012 - Citeseer
Cryptographic Hash Functions: A Review Page 1 Cryptographic Hash Functions: A Review Rajeev
Sobti1, G.Geetha2 1School of Computer Science, Lovely Professional University Phagwara …

On the indifferentiability of the sponge construction

G Bertoni, J Daemen, M Peeters… - … Conference on the Theory …, 2008 - Springer
In this paper we prove that the sponge construction introduced in [4] is indifferentiable from a
random oracle when being used with a random transformation or a random permutation and …

[PDF][PDF] Sha-3 proposal blake

JP Aumasson, L Henzen, W Meier… - Submission to …, 2008 - perso.uclouvain.be
In 1993, NIST published the first Secure Hash Standard SHA-0, which two years later was
superseded by SHA-1 to improve the original design. SHA-1 was still deemed secure by the …

Forkcipher: a new primitive for authenticated encryption of very short messages

E Andreeva, V Lallemand, A Purnal… - … Conference on the …, 2019 - Springer
Highly efficient encryption and authentication of short messages is an essential requirement
for enabling security in constrained scenarios such as the CAN FD in automotive systems …

[PDF][PDF] A framework for iterative hash functions-HAIFA

E Biham, O Dunkelman - Second NIST Cryptographic Hash Workshop, 2006 - csrc.nist.rip
For years hash functions were built from compression functions using the Merkle-Damgård
construction. Recently, several flaws in this construction were identified, allowing for pre …

A framework for iterative hash functions-HAIFA

E Biham, O Dunkelman - Cryptology ePrint Archive, 2007 - eprint.iacr.org
Since the seminal works of Merkle and Damgard on the iteration of compression functions,
hash functions were built from compression functions using the Merkle-Damgard …

Cryptographic hash functions: Recent design trends and security notions

S Al-Kuwari, JH Davenport, RJ Bradford - Cryptology ePrint Archive, 2011 - eprint.iacr.org
Recent years have witnessed an exceptional research interest in cryptographic hash
functions, especially after the popular attacks against MD5 and SHA-1 in 2005. In 2007, the …

The first 30 years of cryptographic hash functions and the NIST SHA-3 competition

B Preneel - Cryptographers' track at the RSA conference, 2010 - Springer
The first designs of cryptographic hash functions date back to the late 1970s; more
proposals emerged in the 1980s. During the 1990s, the number of hash function designs …

[PDF][PDF] Attacks on hash functions and applications

M Stevens - Mathematical Institute, Faculty of …, 2012 - scholarlypublications …
P g.
N s. M …

Constructing cryptographic hash functions from fixed-key blockciphers

P Rogaway, J Steinberger - Advances in Cryptology–CRYPTO 2008: 28th …, 2008 - Springer
We propose a family of compression functions built from fixed-key blockciphers and
investigate their collision and preimage security in the ideal-cipher model. The constructions …