Multicollisions in sponge construction
Cryptographic hash functions take an unfixed size of input and produce a fixed size of an output. A hash function is built using two main components: a compression function and mode of operation. Sponge construction is one of the main operations of modes used in modern cryptographic hash functio...
Main Authors: | Alahmad, Mohammad A., Alshaikhli, Imad Fakhri Taha, Nandi, Mridul |
---|---|
Format: | Conference or Workshop Item |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://irep.iium.edu.my/34357/ http://irep.iium.edu.my/34357/ http://irep.iium.edu.my/34357/ http://irep.iium.edu.my/34357/1/icicm13-paper.pdf |
Similar Items
-
Joux multicollisions attack in sponge construction
by: AlAhmad, Mohammad A., et al.
Published: (2013) -
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013) -
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013) -
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013) -
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)