You're seeing our new discovery page and we'd like your opinion. Tell us your feedback.
A list of tags associated with this document:
 Chapter 19
Advances in Cryptology – CRYPTO 2004 (2004): Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
 Authors:
 Antoine Joux
In this paper, we study the existence of multicollisions in iterated hash functions. We show that finding multicollisions, i.e. r tuples of messages that all hash to the same value, is not much harder than finding ordinary collisions, i.e. pairs of messages, even for extremely large values of r . More precisely, the ratio of the complexities of the attacks is approximately equal to the logarithm of r . Then, using large multicollisions as a tool, we solve a long standing open problem and prove that concatenating the results of several iterated hash functions in order to build a larger one does not yield a secure construction. We also discuss the potential impact of our attack on several published schemes. Quite surprisingly, for subtle reasons, the schemes we study happen to be immune to our attack.
Metrics
Most Downloaded Chapters
 Chapter 3 , Short Group Signatures, has 3526 Downloads
 Chapter 19 , Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, has 2547 Downloads
 Chapter 4 , Signature Schemes and Anonymous Credentials from Bilinear Maps, has 2469 Downloads
 Chapter 32 , PrivacyPreserving Datamining on Vertically Partitioned Databases, has 1669 Downloads
 Chapter 27 , Secure Identity Based Encryption Without Random Oracles, has 1631 Downloads
Best performing chapters in Computer Science, sorted by

There are 47.5K downloads of Chapter 34 of Deep Learning via Semisupervised Embedding by Ronan Collobert, Hossein Mobahi, Frédéric Ratle, Jason Weston  2012

There are 45.6K downloads of Chapter 32 of A Practical Guide to Training Restricted Boltzmann Machines by Geoffrey E. Hinton  2012

There are 44.9K downloads of Chapter 26 of Practical Recommendations for GradientBased Training of Deep Architectures by Yoshua Bengio  2012

There are 44.8K downloads of Chapter 30 of Learning Feature Representations with KMeans by Andrew Y. Ng, Adam Coates  2012

There are 44.6K downloads of Chapter 3 of Efficient BackProp by KlausRobert Müller, Genevieve B. Orr, Léon Bottou, Yann A. LeCun  2012

There are 43.9K downloads of Chapter 25 of Stochastic Gradient Descent Tricks by Léon Bottou  2012

There are 43K downloads of Chapter 36 of A Practical Guide to Applying Echo State Networks by Mantas Lukoševičius  2012

There are 42.9K downloads of Chapter 5 of Early Stopping — But When? by Lutz Prechelt  2012

There are 42.8K downloads of Chapter 27 of Training Deep and Recurrent Networks with HessianFree Optimization by Ilya Sutskever, James Martens  2012

There are 42.7K downloads of Chapter 17 of Transformation Invariance in Pattern Recognition – Tangent Distance and Tangent Propagation by Bernard Victorri, John S. Denker, Yann A. LeCun, Patrice Y. Simard  2012

There are 1.35K Citations of Chapter 23 of limma: Linear Models for Microarray Data G. K. Smyth  2005

There are 879 Citations of Chapter 5 of Dynamic Source Routing in Ad Hoc Wireless Networks David A. Maltz, David B. Johnson  1996

There are 692 Citations of Chapter 32 of SURF: Speeded Up Robust Features Luc Van Gool, Tinne Tuytelaars, Herbert Bay  2006

There are 677 Citations of Chapter 13 of IdentityBased Encryption from the Weil Pairing Matt Franklin, Dan Boneh  2001

There are 657 Citations of Chapter 25 of Differential Power Analysis Benjamin Jun, Joshua Jaffe, Paul Kocher  1999

There are 632 Citations of Chapter 24 of Z3: An Efficient SMT Solver Nikolaj Bjørner, Leonardo de Moura  2008

There are 599 Citations of Chapter 1 of Ensemble Methods in Machine Learning Thomas G. Dietterich  2000

There are 569 Citations of Chapter 16 of PublicKey Cryptosystems Based on Composite Degree Residuosity Classes Pascal Paillier  1999

There are 491 Citations of Chapter 5 of IdentityBased Cryptosystems and Signature Schemes Adi Shamir  1985

There are 464 Citations of Chapter 19 of Text categorization with Support Vector Machines: Learning with many relevant features Thorsten Joachims  1998

There are 0 downloads of Chapter 2 of Android Studio by  2018

There are 0 downloads of Chapter 4 of Activities and Layouts by  2018

There are 0 downloads of Chapter 5 of Handling Events by  2018

There are 0 downloads of Chapter 6 of Working with Multiple Activities by  2018

There are 0 downloads of Chapter 7 of UI Elements by  2018

There are 0 downloads of Chapter 10 of Data Persistence by  2018

There are 0 downloads of Chapter 11 of App Distribution by  2018

There are 0 downloads of Chapter 3 of Machine Learning Basics by  2018

There are 0 downloads of Chapter 7 of Recurrent Neural Networks by  2018

There are 0 downloads of Chapter 8 of Autoencoders by  2018
Purchase this book
Get this bookAdvances in Cryptology – CRYPTO 2004 Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
This dialog will, depending on your institutional affiliation, allow you to purchase an ebook, purchase a print book, or download a PDF copy of the book.
When you click on the button below, you will be redirected to springer.com where you can finish shopping.
Download chapter as PDF Buy print editionChapter details
 Part of book
 Advances in Cryptology – CRYPTO 2004
 Affiliation
 DCSSI Crypto Lab, Paris 07 SP, France
 DOI
 10.1007/9783540286288_19
This book is part of an eBook collection
Computer Science