[HTML][HTML] Quantum hash function based on controlled alternate lively quantum walks

P Hou, T Shang, Y Zhang, Y Tang, J Liu - Scientific Reports, 2023 - nature.com
Quantum hash function is an important area of interest in the field of quantum cryptography.
Quantum hash function based on controlled alternate quantum walk is a mainstream branch …

On the security of sponge-type authenticated encryption modes

B Chakraborty, A Jha, M Nandi - Cryptology ePrint Archive, 2019 - eprint.iacr.org
The sponge duplex is a popular mode of operation for constructing authenticated encryption
schemes. In fact, one can assess the popularity of this mode from the fact that around $25 …

Evaluating the security of Merkle-Damgård hash functions and combiners in quantum settings

Z Bao, J Guo, S Li, P Pham - … Conference on Network and System Security, 2022 - Springer
In this work, we evaluate the security of Merkle-Damgård (MD) hash functions and their
combiners (XOR and concatenation combiners) in quantum settings. Two main quantum …

Generic attacks on hash combiners

Z Bao, I Dinur, J Guo, G Leurent, L Wang - Journal of Cryptology, 2020 - Springer
Hash combiners are a practical way to make cryptographic hash functions more tolerant to
future attacks and compatible with existing infrastructure. A combiner combines two or more …

Improving Generic Attacks Using Exceptional Functions

X Bonnetain, RH Boissier, G Leurent… - Cryptology ePrint …, 2024 - eprint.iacr.org
Over the past ten years, the statistical properties of random functions have been particularly
fruitful for generic attacks. Initially, these attacks targeted iterated hash constructions and …

Functional graphs and their applications in generic attacks on iterated hash constructions

Z Bao, J Guo, L Wang - Cryptology ePrint Archive, 2018 - eprint.iacr.org
We provide a survey about generic attacks on cryptographic hash constructions including
hash-based message authentication codes and hash combiners. We look into attacks …

A Second Preimage Attack on the XOR Hash Combiner

S Chen, T Cui, C Jin, C Wang - IET Information Security, 2024 - Wiley Online Library
The exclusive‐or (XOR) hash combiner is a classical hash function combiner, which is well
known as a good PRF and MAC combiner, and is used in practice in TLS versions 1.0 and …

Quantum attacks on hash constructions with low quantum random access memory

X Dong, S Li, P Pham, G Zhang - … on the Theory and Application of …, 2023 - Springer
Abstract At ASIACRYPT 2022, Benedikt, Fischlin, and Huppert proposed the quantum
herding attacks on iterative hash functions for the first time. Their attack needs exponential …

Attacking the IETF/ISO standard for internal re-keying CTR-ACPKM

O Dunkelman, S Ghosh, E Lambooij - IACR Transactions on Symmetric …, 2023 - tosc.iacr.org
Encrypting too much data using the same key is a bad practice from a security perspective.
Hence, it is customary to perform re-keying after a given amount of data is transmitted. While …

非平衡r- 碰撞问题的高效解决算法

邹剑, 李金春, 董乐, 李灵琛 - Journal of Cryptologic Research, 2023 - search.proquest.com
目前, 在非平衡环境下的r-碰撞问题还没有得到有效的解决. 本文提出了一种新的高效算法来对r
个不同的非平衡函数寻找对应的r-碰撞. 新算法是将现有的r-碰撞算法, 并行碰撞搜索算法与非 …