Paper 2011/307
Ways to restrict the differential path
ZiJie Xu and Ke Xu
Abstract
People had developed some attack methods to attack hash function. These methods need to choose some "differential pattern"[Dau05]. We present a way to restrict the collisions that hold the "differential pattern". At the same time, to build a hash function that meet the different needs, we propose a construction.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- differential pathdifferential cryptanalysishash functiondata-depend function
- Contact author(s)
- xuzijiewz @ gmail com
- History
- 2011-09-09: last of 2 revisions
- 2011-06-13: received
- See all versions
- Short URL
- https://ia.cr/2011/307
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/307, author = {ZiJie Xu and Ke Xu}, title = {Ways to restrict the differential path}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/307}, year = {2011}, url = {https://eprint.iacr.org/2011/307} }