Paper 2011/307

Ways to restrict the differential path

ZiJie Xu and Ke Xu

Abstract

People had developed some attack methods to attack hash function. These methods need to choose some "differential pattern"[Dau05]. We present a way to restrict the collisions that hold the "differential pattern". At the same time, to build a hash function that meet the different needs, we propose a construction.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
differential pathdifferential cryptanalysishash functiondata-depend function
Contact author(s)
xuzijiewz @ gmail com
History
2011-09-09: last of 2 revisions
2011-06-13: received
See all versions
Short URL
https://ia.cr/2011/307
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/307,
      author = {ZiJie Xu and Ke Xu},
      title = {Ways to restrict the differential path},
      howpublished = {Cryptology ePrint Archive, Paper 2011/307},
      year = {2011},
      note = {\url{https://eprint.iacr.org/2011/307}},
      url = {https://eprint.iacr.org/2011/307}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.