all InfoSec news
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions
March 15, 2023, 1:06 p.m. |
IACR News www.iacr.org
ePrint Report: Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions
Cody Freitag, Ashrujit Ghoshal, Ilan Komargodski
Cryptographic hash functions map data of arbitrary size to a fixed size digest, and are one of the most commonly used cryptographic objects. As it is infeasible to design an individual hash function for every input size, variable-input length hash functions are built by designing and bootstrapping a single fixed-input length function that looks sufficiently random. To prevent trivial preprocessing …
data design digest eprint report function functions hash hash function hash functions input length map report security size space variable
More from www.iacr.org / IACR News
Blink: An Optimal Proof of Proof-of-Work
1 day, 16 hours ago |
www.iacr.org
PN-based Attacks in the White-box Setting
1 day, 16 hours ago |
www.iacr.org
Succinct Functional Commitments for Circuits from k-Lin
1 day, 22 hours ago |
www.iacr.org
Levin–Kolmogorov Complexity is not in Linear Time
1 day, 22 hours ago |
www.iacr.org
Unstructured Inversions of New Hope
1 day, 22 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Cyber Security Engineer I
@ Fortress Security Risk Management | Cleveland, OH, United States
Senior DevSecOps Engineer
@ Wisk Aero | Remote United States
Vulnerable Adult Investigator - Vice President
@ JPMorgan Chase & Co. | Chicago, IL, United States
Consultant Réseaux IT Digital Impulse - H/F
@ Talan | Paris, France
DevSecOps Engineer (Onsite)
@ Accenture Federal Services | Arlington, VA
Senior Security Engineer
@ Minitab | State College, Pennsylvania, United States