You're seeing our new discovery page and we'd like your opinion. Tell us your feedback.
A list of tags associated with this document:
 Chapter 19
Advances in Cryptology – CRYPTO 2004 (2004): Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
 Authors:
 Antoine Joux
In this paper, we study the existence of multicollisions in iterated hash functions. We show that finding multicollisions, i.e. r tuples of messages that all hash to the same value, is not much harder than finding ordinary collisions, i.e. pairs of messages, even for extremely large values of r . More precisely, the ratio of the complexities of the attacks is approximately equal to the logarithm of r . Then, using large multicollisions as a tool, we solve a long standing open problem and prove that concatenating the results of several iterated hash functions in order to build a larger one does not yield a secure construction. We also discuss the potential impact of our attack on several published schemes. Quite surprisingly, for subtle reasons, the schemes we study happen to be immune to our attack.
Metrics
Most Downloaded Chapters
 Chapter 3 , Short Group Signatures, has 4201 Downloads
 Chapter 4 , Signature Schemes and Anonymous Credentials from Bilinear Maps, has 3255 Downloads
 Chapter 19 , Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, has 2943 Downloads
 Chapter 32 , PrivacyPreserving Datamining on Vertically Partitioned Databases, has 1983 Downloads
 Chapter 27 , Secure Identity Based Encryption Without Random Oracles, has 1921 Downloads
Best performing chapters in Computer Science, sorted by

There are 74.9K downloads of Chapter 21315 of zeroaddress instruction by Martin H. Weik D.Sc.  2001

There are 55.8K downloads of Chapter 14 of Unsupervised Learning by Jerome Friedman, Robert Tibshirani, Trevor Hastie  2009

There are 52.6K downloads of Chapter 34 of Deep Learning via Semisupervised Embedding by Ronan Collobert, Hossein Mobahi, Frédéric Ratle, Jason Weston  2012

There are 51.8K downloads of Chapter 2 of Overview of Supervised Learning by Jerome Friedman, Robert Tibshirani, Trevor Hastie  2009

There are 51.1K downloads of Chapter 3 of Linear Methods for Regression by Jerome Friedman, Robert Tibshirani, Trevor Hastie  2009

There are 51.1K downloads of Chapter 1 of Introduction by Jerome Friedman, Robert Tibshirani, Trevor Hastie  2009

There are 50.8K downloads of Chapter 32 of A Practical Guide to Training Restricted Boltzmann Machines by Geoffrey E. Hinton  2012

There are 50.5K downloads of Chapter 5 of Basis Expansions and Regularization by Jerome Friedman, Robert Tibshirani, Trevor Hastie  2009

There are 50.3K downloads of Chapter 31 of Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation by Alvaro Oliveira, Michael Nilsson, Brigitte Trousse, Marc Pallot, Nicos Komninos, Hans Schaffers  2011

There are 50K downloads of Chapter 26 of Practical Recommendations for GradientBased Training of Deep Architectures by Yoshua Bengio  2012

There are 1.53K Citations of Chapter 23 of limma: Linear Models for Microarray Data G. K. Smyth  2005

There are 1.41K Citations of Chapter 32 of SURF: Speeded Up Robust Features Luc Van Gool, Tinne Tuytelaars, Herbert Bay  2006

There are 1.28K Citations of Chapter 25 of Differential Power Analysis J. S. Baras, R. Poovendran, Amit Sahai, Sridhar Rajagopalan, Ravi Kumar, Yuval Ishai, Benny Pinkas, Moni Naor, Amnon TaShma, Tomas Sander, Tatsuaki Okamoto, Eiichiro Fujisaki, Amit Sahai, Victor Boyko, Rafail Ostrovsky, Giovanni Di Crescenzo, Salil Vadhan, Amit Sahai, Oded Goldreich, Philip MacKenzie, Markus Jakobsson, Juan A. Garay, Sara K. Miner, Markus Michels, Jan Camenisch, Pankaj Rohatgi, Josyula R. Rao, Charanjit S. Jutla, Suresh Chari, Yiqun Lisa Yin, Jessica Staddon, Eli Gafni, Tamir Tassa, Amos Fiat, Matthew Franklin, Dan Boneh, Nick HowgraveGraham, Glenn Durfee, Dan Boneh, Dai ZongDuo, Lam KwokYan, Ye DingFeng, Don Coppersmith, Hugo Krawczyk, Oded Goldreich, Mihir Bellare, Mihir Bellare, Jee Hea An, Zulfikar Ramzan, Sarvar Patel, Mark Etzel, P. Rogaway, T. Krovetz, H. Krawczyk, S. Halevi, J. Black, Palash Sarkar, Subhamoy Maitra, Fredrik Jönsson, Thomas Johansson, David Wagner, M. J. B. Robshaw, Lars R. Knudsen, Berry Schoenmakers, Masayuki Abe, Niv Gilboa, Tal Rabin, Hugo Krawczyk, Stanisław Jarecki, Rosario Gennaro, Ran Canetti, Silvio Micali, Tal Malkin, Amos Beimel, Michael O. Rabin, Yonatan Aumann, Ueli Maurer, Jacques Stern, Phong Nguyen, Adi Shamir, Aviad Kipnis, Julien P. Stern, David Naccache, JeanSébastien Coron  1999

There are 1.21K Citations of Chapter 13 of IdentityBased Encryption from the Weil Pairing Giuseppe Persiano, Rafail Ostrovsky, Giovanni Di Crescenzo, Alfredo De Santis, Silvio Micali, Victor Shoup, Frank Petzold, Klaus Kursawe, Christian Cachin, Serge Fehr, Ivan Damgård, Ronald Cramer, Sang Geun Hahn, Sang Jin Lee, Eonkyung Lee, Choonsik Park, Seongtaek Chee, Jae Heon Kim, KilChan Ha, SeongHun Paeng, Jung Hee Cheon, Jovan D. Golić, David Naccache, JeanSébastien Coron, Christophe Clavier, Eric Brier, Yehuda Lindell, Oded Goldreich, Anna Lysyanskaya, Jan Camenisch, Kazue Sako, Jun Furukawa, Yael Tauman, Adi Shamir, Leonid Reyzin, Gene Itkis, Hugo Krawczyk, Chanathip Namprempre, Lars Knudsen, Alexandra Boldyreva, Mihir Bellare, Jacques Stern, David Pointcheval, Tatsuaki Okamoto, Eiichiro Fujisaki, Victor Shoup, James Manger, Igor E. Shparlinski, Dan Boneh, Scott A. Vanstone, Robert J. Lambert, Robert P. Gallant, Yehuda Lindell, Yan Zong Ding, Michael K. Reiter, Philip MacKenzie, Ivan Damgård, Ronald Cramer, Ueli Maurer, Martin Hirt, Rafail Ostrovsky, Ueli Maurer, Juan A. Garay, Matthias Fitzi, Moti Yung, Aggelos Kiayias, Jeff Lotspiech, Moni Naor, Dalit Naor, Marc Fischlin, Ran Canetti, Ke Yang, Salil Vadhan, Amit Sahai, Steven Rudich, Rusell Impagliazzo, Oded Goldreich, Boaz Barak  2001

There are 1.09K Citations of Chapter 24 of Z3: An Efficient SMT Solver Nikolaj Bjørner, Leonardo de Moura  2008

There are 1.08K Citations of Chapter 1 of Ensemble Methods in Machine Learning Thomas G. Dietterich  2000

There are 985 Citations of Chapter 5 of IdentityBased Cryptosystems and Signature Schemes Adi Shamir  1985

There are 893 Citations of Chapter 5 of Dynamic Source Routing in Ad Hoc Wireless Networks  1996

There are 883 Citations of Chapter 18 of Pastry: Scalable, Decentralized Object Location, and Routing for LargeScale PeertoPeer Systems Dongyan Xu, Xiaohui Gu, Klara Nahrstedt, Duangdao Wichadakul, Richard D. Schlichting, Mohan Rajagopalan, Matti A. Hiltunen, Jun He, Sacha Krakowiak, Noël De Palma, Eric Bruneton, Philippe Laumay, Walt Yao, Ken Moody, Jean Bacon, Tatsuo Nakajima, Willy Zwaenepoel, Dan S. Wallach, Mahadev Satyanarayanan, Eyal de Lara, Jason Flinn, Sung Ho Park, Jun Ho Park, Soon Ju Kang, JeanCharles Fabre, Eric Marsden, Stuart M. Wheater, Santosh K. Shrivastava, Ian Robinson, Mark C. Little, Iain Houston, Jutta Willamowski, François Pacull, Damián Arregui, Nikos Parlavantzas, Geoff Coulson, Gordon S. Blair, Michael Clarke, Hafedh Mili, Gautier Koscielny, Salah Sadou, Calton Pu, Jonathan Walpole, Jie Huang, Andrew P. Black, Rainer Koster, Nandagopal Ancha, Udiyan I. Padmanabhan, Philip K. McKinley, Arkady Zaslavsky, Seng Wai Loke, Jaga Indulska, Andry Rakotonirainy, Martina Zitterbart, Jochen Seitz, Rainer Ruggaber, Timm Reinstorf, Shuping Ran, Paul Brebner, Anand Tripathi, John Eberhard, Doug Palmer, Dean Kuo  2001

There are 824 Citations of Chapter 24 of The Sybil Attack John R. Douceur  2002

There are 90 downloads of Chapter 5 of Implementing Modbus and CAN Bus Protocol Conversion Interface by Hoa TranDang, DongSeong Kim  2019

There are 76 downloads of Chapter 29 of A Computerized Tool Based on Cellular Automata and Modified Game of Life for Urban Growth Region Analysis by Sharifah Aliman, Nur Azmina Mohamad Zamani, Siti Z. Z. Abidin  2019

There are 110 downloads of Chapter 20 of SocioTechnical System Design Framework for People with Disability by Ning Gu, Tun Lu, Peng Liu  2019

There are 100 downloads of Chapter 37 of Watershed Flood Forecasting Based on Cluster Analysis and BP Neural Network by Yan Tang, Wangsong Wang  2019

There are 108 downloads of Chapter 34 of Facial Expression Recognition Algorithm Based on Equal Probability Symbolization Entropy by Xiangwei Zheng, Bin Hu, Fa Zheng  2019

There are 104 downloads of Chapter 39 of EnergyEfficiency for Smartphones Using Interaction Link Prediction in Mobile Cloud Computing by Xiangrui Xu, Chao Guan, Jiuyun Xu  2019

There are 103 downloads of Chapter 25 of LSTM Sentiment Polarity Analysis Based on LDA Clustering by Lunke Fei, Xiaozhao Fang, Junping He, Zhenhua Zhang, Huan Tang, Wei Zhang, Shaohua Teng, Zechuan Chen  2019

There are 105 downloads of Chapter 32 of Multikernel CollaborationInduced Fuzzy Local Information CMeans Algorithm for Image Segmentation by Xi Wu, Xiaocheng Song, Fuji Ren, Xianghui Hu, Yiming Tang  2019

There are 111 downloads of Chapter 3 of Research on Data Provenance Model for Multidisciplinary Collaboration by Ning Gu, Tun Lu, Beisi Zhou, Fangyu Yu  2019

There are 100 downloads of Chapter 17 of A Probabilistic and Rebalancing Cache Placement Strategy for ICN in MANETs by Haiquan Wang, Chunhe Xia, Cheng Zhang  2019
Purchase this book
Get this bookAdvances in Cryptology – CRYPTO 2004 Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
This dialog will, depending on your institutional affiliation, allow you to purchase an ebook, purchase a print book, or download a PDF copy of the book.
When you click on the button below, you will be redirected to springer.com where you can finish shopping.
Download chapter as PDF Buy print editionChapter details
 Part of book
 Advances in Cryptology – CRYPTO 2004
 Affiliation
 DCSSI Crypto Lab, Paris 07 SP, France
 DOI
 10.1007/9783540286288_19
This book is part of an eBook collection
Computer Science