all InfoSec news
Highly-Effective Backdoors for Hash Functions and Beyond
April 6, 2024, 4:12 a.m. |
IACR News www.iacr.org
ePrint Report: Highly-Effective Backdoors for Hash Functions and Beyond
Mihir Bellare, Doreen Riepel, Laura Shea
We study the possibility of schemes whose public parameters have been generated along with a backdoor. We consider the goal of the big-brother adversary to be two-fold: It desires utility (it can break the scheme) but also exclusivity (nobody else can). Starting with hash functions, we give new, strong definitions for these two goals, calling the combination high effectiveness. We then present a construction of …
adversary backdoor backdoors beyond big can eprint report functions generated goal hash hash functions public report study utility
More from www.iacr.org / IACR News
Information-theoretic security with asymmetries
2 days, 8 hours ago |
www.iacr.org
Cryptanalytic Audit of the XHash Sponge Function and its Components
2 days, 8 hours ago |
www.iacr.org
Ipotane: Achieving the Best of All Worlds in Asynchronous BFT
2 days, 8 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Sr. Cloud Security Engineer
@ BLOCKCHAINS | USA - Remote
Network Security (SDWAN: Velocloud) Infrastructure Lead
@ Sopra Steria | Noida, Uttar Pradesh, India
Senior Python Engineer, Cloud Security
@ Darktrace | Cambridge
Senior Security Consultant
@ Nokia | United States
Manager, Threat Operations
@ Ivanti | United States, Remote
Lead Cybersecurity Architect - Threat Modeling | AWS Cloud Security
@ JPMorgan Chase & Co. | Columbus, OH, United States