[HTML][HTML] Quantum hash function based on controlled alternate lively quantum walks
P Hou, T Shang, Y Zhang, Y Tang, J Liu - Scientific Reports, 2023 - nature.com
Quantum hash function is an important area of interest in the field of quantum cryptography.
Quantum hash function based on controlled alternate quantum walk is a mainstream branch …
Quantum hash function based on controlled alternate quantum walk is a mainstream branch …
On the security of sponge-type authenticated encryption modes
The sponge duplex is a popular mode of operation for constructing authenticated encryption
schemes. In fact, one can assess the popularity of this mode from the fact that around $25 …
schemes. In fact, one can assess the popularity of this mode from the fact that around $25 …
Evaluating the security of Merkle-Damgård hash functions and combiners in quantum settings
In this work, we evaluate the security of Merkle-Damgård (MD) hash functions and their
combiners (XOR and concatenation combiners) in quantum settings. Two main quantum …
combiners (XOR and concatenation combiners) in quantum settings. Two main quantum …
Generic attacks on hash combiners
Hash combiners are a practical way to make cryptographic hash functions more tolerant to
future attacks and compatible with existing infrastructure. A combiner combines two or more …
future attacks and compatible with existing infrastructure. A combiner combines two or more …
Improving Generic Attacks Using Exceptional Functions
X Bonnetain, RH Boissier, G Leurent… - Cryptology ePrint …, 2024 - eprint.iacr.org
Over the past ten years, the statistical properties of random functions have been particularly
fruitful for generic attacks. Initially, these attacks targeted iterated hash constructions and …
fruitful for generic attacks. Initially, these attacks targeted iterated hash constructions and …
Functional graphs and their applications in generic attacks on iterated hash constructions
We provide a survey about generic attacks on cryptographic hash constructions including
hash-based message authentication codes and hash combiners. We look into attacks …
hash-based message authentication codes and hash combiners. We look into attacks …
A Second Preimage Attack on the XOR Hash Combiner
S Chen, T Cui, C Jin, C Wang - IET Information Security, 2024 - Wiley Online Library
The exclusive‐or (XOR) hash combiner is a classical hash function combiner, which is well
known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and …
known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and …
Quantum attacks on hash constructions with low quantum random access memory
X Dong, S Li, P Pham, G Zhang - … on the Theory and Application of …, 2023 - Springer
Abstract At ASIACRYPT 2022, Benedikt, Fischlin, and Huppert proposed the quantum
herding attacks on iterative hash functions for the first time. Their attack needs exponential …
herding attacks on iterative hash functions for the first time. Their attack needs exponential …
Attacking the IETF/ISO standard for internal re-keying CTR-ACPKM
Encrypting too much data using the same key is a bad practice from a security perspective.
Hence, it is customary to perform re-keying after a given amount of data is transmitted. While …
Hence, it is customary to perform re-keying after a given amount of data is transmitted. While …
非平衡r- 碰撞问题的高效解决算法
邹剑, 李金春, 董乐, 李灵琛 - Journal of Cryptologic Research, 2023 - search.proquest.com
目前, 在非平衡环境下的r-碰撞问题还没有得到有效的解决. 本文提出了一种新的高效算法来对r
个不同的非平衡函数寻找对应的r-碰撞. 新算法是将现有的r-碰撞算法, 并行碰撞搜索算法与非 …
个不同的非平衡函数寻找对应的r-碰撞. 新算法是将现有的r-碰撞算法, 并行碰撞搜索算法与非 …