all InfoSec news
Topic: hash functions
Generic MitM Attack Frameworks on Sponge Constructions
1 month, 1 week ago |
www.iacr.org
On the Direct Construction of MDS and Near-MDS Matrices
1 month, 3 weeks ago |
arxiv.org
Highly-Effective Backdoors for Hash Functions and Beyond
1 month, 3 weeks ago |
www.iacr.org
Solving Degree Bounds For Iterated Polynomial Systems
2 months, 3 weeks ago |
arxiv.org
Diving Deep into the Preimage Security of AES-like Hashing
3 months, 1 week ago |
www.iacr.org
Fiat-Shamir for Bounded-Depth Adversaries
3 months, 2 weeks ago |
www.iacr.org
Cayley hashing with cookies
3 months, 2 weeks ago |
www.iacr.org
On Tweakable Correlation Robust Hashing against Key Leakages
3 months, 3 weeks ago |
www.iacr.org
Automated Meet-in-the-Middle Attack Goes to Feistel
8 months, 2 weeks ago |
www.iacr.org
Streebog as a Random Oracle
10 months, 3 weeks ago |
www.iacr.org
XHash8 and XHash12: Efficient STARK-friendly Hash Functions
10 months, 4 weeks ago |
www.iacr.org
On the Construction of Near-MDS Matrices. (arXiv:2306.12791v1 [cs.CR])
11 months, 1 week ago |
arxiv.org
One-Way Functions vs. TFNP: Simpler and Improved
11 months, 1 week ago |
www.iacr.org
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH
11 months, 3 weeks ago |
www.iacr.org
Simplified Modeling of MITM Attacks for Block Ciphers: new (Quantum) Attacks
11 months, 3 weeks ago |
www.iacr.org
A Randomized Bit Generator using Algebraic Number Theory
1 year, 1 month ago |
www.iacr.org
SAFE: Sponge API for Field Elements
1 year, 1 month ago |
www.iacr.org
Generic Security of the SAFE API and Its Applications
1 year, 1 month ago |
www.iacr.org
Non-interactive Universal Arguments
1 year, 2 months ago |
www.iacr.org
Windows 11 gets phishing protection boost and SHA-3 support
1 year, 2 months ago |
www.bleepingcomputer.com
Breaking Pedersen Hashes in Practice
1 year, 2 months ago |
research.nccgroup.com
Publicly-Verifiable Deletion via Target-Collapsing Functions
1 year, 2 months ago |
www.iacr.org
Poseidon2: A Faster Version of the Poseidon Hash Function
1 year, 2 months ago |
www.iacr.org
New Records in Collision Attacks on RIPEMD-160 and SHA-256
1 year, 3 months ago |
www.iacr.org
Threshold and Multi-Signature Schemes from Linear Hash Functions
1 year, 3 months ago |
www.iacr.org
The Role of Hash Functions in Cryptography
1 year, 3 months ago |
infosecwriteups.com
Nothing found.
Items published with this topic over the last 90 days.
Latest
Generic MitM Attack Frameworks on Sponge Constructions
1 month, 1 week ago |
www.iacr.org
On the Direct Construction of MDS and Near-MDS Matrices
1 month, 3 weeks ago |
arxiv.org
Highly-Effective Backdoors for Hash Functions and Beyond
1 month, 3 weeks ago |
www.iacr.org
Solving Degree Bounds For Iterated Polynomial Systems
2 months, 3 weeks ago |
arxiv.org
Diving Deep into the Preimage Security of AES-like Hashing
3 months, 1 week ago |
www.iacr.org
Fiat-Shamir for Bounded-Depth Adversaries
3 months, 2 weeks ago |
www.iacr.org
Cayley hashing with cookies
3 months, 2 weeks ago |
www.iacr.org
On Tweakable Correlation Robust Hashing against Key Leakages
3 months, 3 weeks ago |
www.iacr.org
Automated Meet-in-the-Middle Attack Goes to Feistel
8 months, 2 weeks ago |
www.iacr.org
Streebog as a Random Oracle
10 months, 3 weeks ago |
www.iacr.org
XHash8 and XHash12: Efficient STARK-friendly Hash Functions
10 months, 4 weeks ago |
www.iacr.org
On the Construction of Near-MDS Matrices. (arXiv:2306.12791v1 [cs.CR])
11 months, 1 week ago |
arxiv.org
One-Way Functions vs. TFNP: Simpler and Improved
11 months, 1 week ago |
www.iacr.org
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH
11 months, 3 weeks ago |
www.iacr.org
Simplified Modeling of MITM Attacks for Block Ciphers: new (Quantum) Attacks
11 months, 3 weeks ago |
www.iacr.org
A Randomized Bit Generator using Algebraic Number Theory
1 year, 1 month ago |
www.iacr.org
SAFE: Sponge API for Field Elements
1 year, 1 month ago |
www.iacr.org
Generic Security of the SAFE API and Its Applications
1 year, 1 month ago |
www.iacr.org
Non-interactive Universal Arguments
1 year, 2 months ago |
www.iacr.org
Windows 11 gets phishing protection boost and SHA-3 support
1 year, 2 months ago |
www.bleepingcomputer.com
Breaking Pedersen Hashes in Practice
1 year, 2 months ago |
research.nccgroup.com
Publicly-Verifiable Deletion via Target-Collapsing Functions
1 year, 2 months ago |
www.iacr.org
Poseidon2: A Faster Version of the Poseidon Hash Function
1 year, 2 months ago |
www.iacr.org
New Records in Collision Attacks on RIPEMD-160 and SHA-256
1 year, 3 months ago |
www.iacr.org
Threshold and Multi-Signature Schemes from Linear Hash Functions
1 year, 3 months ago |
www.iacr.org
The Role of Hash Functions in Cryptography
1 year, 3 months ago |
infosecwriteups.com
Topic trend (last 90 days)
Top (last 7 days)
Nothing found.
Jobs in InfoSec / Cybersecurity
CyberSOC Technical Lead
@ Integrity360 | Sandyford, Dublin, Ireland
Cyber Security Strategy Consultant
@ Capco | New York City
Cyber Security Senior Consultant
@ Capco | Chicago, IL
Sr. Product Manager
@ MixMode | Remote, US
Corporate Intern - Information Security (Year Round)
@ Associated Bank | US WI Remote
Senior Offensive Security Engineer
@ CoStar Group | US-DC Washington, DC