Joux multicollisions attack in sponge construction
Cryptographic hash functions take an unfixed size of input and produce a fixed size of an output. A hash function usually has two main components: a compression function and mode of operation. Sponge construction is one of the main operations of modes of used in modern cryptographic hash functio...
Main Authors: | AlAhmad, Mohammad A., Alshaikhli, Imad Fakhri Taha, Nandi, Mridul |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/34344/ http://irep.iium.edu.my/34344/ http://irep.iium.edu.my/34344/ http://irep.iium.edu.my/34344/1/Joux_multicollisions_attack_in_Sponge_construction-IEEE.pdf |
Similar Items
-
Multicollisions in sponge construction
by: Alahmad, Mohammad A., et al.
Published: (2013) -
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013) -
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013) -
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013) -
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)