Cryptology ePrint Archive: Report 2011/307
Ways to restrict the differential path
ZiJie Xu and Ke Xu
Abstract: People had developed some attack methods to attack hash function. These methods need to choose some "differential pattern"[Dau05]. We present a way to restrict the collisions that hold the "differential pattern". At the same time, to build a hash function that meet the different needs, we propose a construction.
Category / Keywords: differential path, differential cryptanalysis, hash function, data-depend function
Date: received 4 Jun 2011, last revised 9 Sep 2011
Contact author: xuzijiewz at gmail com
Available formats: PDF | BibTeX Citation
Version: 20110909:151819 (All versions of this report)
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]