all InfoSec news
Topic: hash functions
Generic MitM Attack Frameworks on Sponge Constructions
5 days, 4 hours ago |
www.iacr.org
On the Direct Construction of MDS and Near-MDS Matrices
2 weeks, 4 days ago |
arxiv.org
Solving Degree Bounds For Iterated Polynomial Systems
1 month, 3 weeks ago |
arxiv.org
New Records in Collision Attacks on SHA-2
1 month, 4 weeks ago |
www.iacr.org
Partial Differential Fault Analysis on Ascon
1 month, 4 weeks ago |
www.iacr.org
Fiat-Shamir for Bounded-Depth Adversaries
2 months, 1 week ago |
www.iacr.org
Cayley hashing with cookies
2 months, 1 week ago |
www.iacr.org
On Tweakable Correlation Robust Hashing against Key Leakages
2 months, 2 weeks ago |
www.iacr.org
Lattice-based Programmable Hash Functions and Applications
4 months, 3 weeks ago |
www.iacr.org
Automated Meet-in-the-Middle Attack Goes to Feistel
7 months, 2 weeks ago |
www.iacr.org
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory
7 months, 4 weeks ago |
www.iacr.org
Streebog as a Random Oracle
9 months, 2 weeks ago |
www.iacr.org
XHash8 and XHash12: Efficient STARK-friendly Hash Functions
9 months, 3 weeks ago |
www.iacr.org
One-Way Functions vs. TFNP: Simpler and Improved
10 months, 1 week ago |
www.iacr.org
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH
10 months, 2 weeks ago |
www.iacr.org
Simplified Modeling of MITM Attacks for Block Ciphers: new (Quantum) Attacks
10 months, 2 weeks ago |
www.iacr.org
Benchmarking ZK-Circuits in Circom
11 months, 1 week ago |
www.iacr.org
Comprehensive Preimage Security Evaluations on Rijndael-based Hashing
11 months, 3 weeks ago |
www.iacr.org
A Randomized Bit Generator using Algebraic Number Theory
11 months, 4 weeks ago |
www.iacr.org
Breaking Pedersen Hashes in Practice
1 year, 1 month ago |
research.nccgroup.com
Publicly-Verifiable Deletion via Target-Collapsing Functions
1 year, 1 month ago |
www.iacr.org
New Records in Collision Attacks on RIPEMD-160 and SHA-256
1 year, 2 months ago |
www.iacr.org
Threshold and Multi-Signature Schemes from Linear Hash Functions
1 year, 2 months ago |
www.iacr.org
The Role of Hash Functions in Cryptography
1 year, 2 months ago |
infosecwriteups.com
Generic MitM Attack Frameworks on Sponge Constructions
5 days, 4 hours ago |
www.iacr.org
Items published with this topic over the last 90 days.
Latest
Generic MitM Attack Frameworks on Sponge Constructions
5 days, 4 hours ago |
www.iacr.org
On the Direct Construction of MDS and Near-MDS Matrices
2 weeks, 4 days ago |
arxiv.org
Solving Degree Bounds For Iterated Polynomial Systems
1 month, 3 weeks ago |
arxiv.org
New Records in Collision Attacks on SHA-2
1 month, 4 weeks ago |
www.iacr.org
Partial Differential Fault Analysis on Ascon
1 month, 4 weeks ago |
www.iacr.org
Fiat-Shamir for Bounded-Depth Adversaries
2 months, 1 week ago |
www.iacr.org
Cayley hashing with cookies
2 months, 1 week ago |
www.iacr.org
On Tweakable Correlation Robust Hashing against Key Leakages
2 months, 2 weeks ago |
www.iacr.org
Lattice-based Programmable Hash Functions and Applications
4 months, 3 weeks ago |
www.iacr.org
Automated Meet-in-the-Middle Attack Goes to Feistel
7 months, 2 weeks ago |
www.iacr.org
Quantum Attacks on Hash Constructions with Low Quantum Random Access Memory
7 months, 4 weeks ago |
www.iacr.org
Streebog as a Random Oracle
9 months, 2 weeks ago |
www.iacr.org
XHash8 and XHash12: Efficient STARK-friendly Hash Functions
9 months, 3 weeks ago |
www.iacr.org
One-Way Functions vs. TFNP: Simpler and Improved
10 months, 1 week ago |
www.iacr.org
A Closer Look at the S-box: Deeper Analysis of Round-Reduced ASCON-HASH
10 months, 2 weeks ago |
www.iacr.org
Simplified Modeling of MITM Attacks for Block Ciphers: new (Quantum) Attacks
10 months, 2 weeks ago |
www.iacr.org
Benchmarking ZK-Circuits in Circom
11 months, 1 week ago |
www.iacr.org
Comprehensive Preimage Security Evaluations on Rijndael-based Hashing
11 months, 3 weeks ago |
www.iacr.org
A Randomized Bit Generator using Algebraic Number Theory
11 months, 4 weeks ago |
www.iacr.org
Breaking Pedersen Hashes in Practice
1 year, 1 month ago |
research.nccgroup.com
Publicly-Verifiable Deletion via Target-Collapsing Functions
1 year, 1 month ago |
www.iacr.org
New Records in Collision Attacks on RIPEMD-160 and SHA-256
1 year, 2 months ago |
www.iacr.org
Threshold and Multi-Signature Schemes from Linear Hash Functions
1 year, 2 months ago |
www.iacr.org
The Role of Hash Functions in Cryptography
1 year, 2 months ago |
infosecwriteups.com
Topic trend (last 90 days)
Top (last 7 days)
Generic MitM Attack Frameworks on Sponge Constructions
5 days, 4 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Senior InfoSec Manager - Risk and Compliance
@ Federal Reserve System | Remote - Virginia
Security Analyst
@ Fortra | Mexico
Incident Responder
@ Babcock | Chester, GB, CH1 6ER
Vulnerability, Access & Inclusion Lead
@ Monzo | Cardiff, London or Remote (UK)
Information Security Analyst
@ Unissant | MD, USA