March 15, 2023, 1:06 p.m. |

IACR News www.iacr.org

ePrint Report: Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions

Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski


Cryptographic hash functions map data of arbitrary size to a fixed size digest, and are one of the most commonly used cryptographic objects. As it is infeasible to design an individual hash function for every input size, variable-input length hash functions are built by designing and bootstrapping a single fixed-input length function that looks sufficiently random. To prevent trivial preprocessing …

data design digest eprint report function functions hash hash function hash functions input length map report security size space variable

Cyber Security Engineer I

@ Fortress Security Risk Management | Cleveland, OH, United States

Senior DevSecOps Engineer

@ Wisk Aero | Remote United States

Vulnerable Adult Investigator - Vice President

@ JPMorgan Chase & Co. | Chicago, IL, United States

Consultant Réseaux IT Digital Impulse - H/F

@ Talan | Paris, France

DevSecOps Engineer (Onsite)

@ Accenture Federal Services | Arlington, VA

Senior Security Engineer

@ Minitab | State College, Pennsylvania, United States