Functional graphs and their applications in generic attacks on iterated hash constructions
We provide a survey about generic attacks on cryptographic hash constructions including hash-based message authentication codes and hash combiners. We look into attacks involving iteratively evaluating identical mappings many times. The functional graph of a random mapping also involves iteratively...
Saved in:
Main Authors: | Bao, Zhenzhen, Wang, Lei, Guo, Jian |
---|---|
Other Authors: | School of Physical and Mathematical Sciences |
Format: | Article |
Language: | English |
Published: |
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/103977 http://hdl.handle.net/10220/49462 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Generic attacks on hash combiners
by: Bao, Zhenzhen, et al.
Published: (2020) -
Improved meet-in-the-middle Nostradamus attacks on AES-like hashing
by: Dong, Xiaoyang, et al.
Published: (2024) -
Cryptanalysis of the Tillich-Zémor hash function
by: Grassl, M., et al.
Published: (2014) -
Fast AES-based universal hash functions and MACs: featuring LeMac and Macs
by: Bariant, Augustin, et al.
Published: (2024) -
SPN-hash: Improving the provable resistance against differential collision attacks
by: Choy, J., et al.
Published: (2014)