You're seeing our new discovery page and we'd like your opinion. Tell us your feedback.
A list of tags associated with this document:
 Chapter 19
Advances in Cryptology – CRYPTO 2004 (2004): Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
 Authors:
 Antoine Joux
In this paper, we study the existence of multicollisions in iterated hash functions. We show that finding multicollisions, i.e. r tuples of messages that all hash to the same value, is not much harder than finding ordinary collisions, i.e. pairs of messages, even for extremely large values of r . More precisely, the ratio of the complexities of the attacks is approximately equal to the logarithm of r . Then, using large multicollisions as a tool, we solve a long standing open problem and prove that concatenating the results of several iterated hash functions in order to build a larger one does not yield a secure construction. We also discuss the potential impact of our attack on several published schemes. Quite surprisingly, for subtle reasons, the schemes we study happen to be immune to our attack.
Metrics
Most Downloaded Chapters
 Chapter 3 , Short Group Signatures, has 3715 Downloads
 Chapter 19 , Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, has 2656 Downloads
 Chapter 4 , Signature Schemes and Anonymous Credentials from Bilinear Maps, has 2715 Downloads
 Chapter 32 , PrivacyPreserving Datamining on Vertically Partitioned Databases, has 1761 Downloads
 Chapter 27 , Secure Identity Based Encryption Without Random Oracles, has 1711 Downloads
Best performing chapters in Computer Science, sorted by

There are 49.4K downloads of Chapter 34 of Deep Learning via Semisupervised Embedding by Ronan Collobert, Hossein Mobahi, Frédéric Ratle, Jason Weston  2012

There are 47.5K downloads of Chapter 32 of A Practical Guide to Training Restricted Boltzmann Machines by Geoffrey E. Hinton  2012

There are 46.9K downloads of Chapter 14 of Unsupervised Learning by Jerome Friedman, Robert Tibshirani, Trevor Hastie  2009

There are 46.9K downloads of Chapter 26 of Practical Recommendations for GradientBased Training of Deep Architectures by Yoshua Bengio  2012

There are 46.7K downloads of Chapter 30 of Learning Feature Representations with KMeans by Andrew Y. Ng, Adam Coates  2012

There are 46.5K downloads of Chapter 3 of Efficient BackProp by KlausRobert Müller, Genevieve B. Orr, Léon Bottou, Yann A. LeCun  2012

There are 45.8K downloads of Chapter 25 of Stochastic Gradient Descent Tricks by Léon Bottou  2012

There are 45.4K downloads of Chapter 21315 of zeroaddress instruction by Martin H. Weik D.Sc.  2001

There are 44.9K downloads of Chapter 36 of A Practical Guide to Applying Echo State Networks by Mantas Lukoševičius  2012

There are 44.7K downloads of Chapter 5 of Early Stopping — But When? by Lutz Prechelt  2012

There are 1.37K Citations of Chapter 23 of limma: Linear Models for Microarray Data G. K. Smyth  2005

There are 893 Citations of Chapter 5 of Dynamic Source Routing in Ad Hoc Wireless Networks  1996

There are 711 Citations of Chapter 32 of SURF: Speeded Up Robust Features  2006

There are 700 Citations of Chapter 13 of IdentityBased Encryption from the Weil Pairing Giuseppe Persiano, Rafail Ostrovsky, Giovanni Di Crescenzo, Alfredo De Santis, Silvio Micali, Victor Shoup, Frank Petzold, Klaus Kursawe, Christian Cachin, Serge Fehr, Ivan Damgård, Ronald Cramer, Sang Geun Hahn, Sang Jin Lee, Eonkyung Lee, Choonsik Park, Seongtaek Chee, Jae Heon Kim, KilChan Ha, SeongHun Paeng, Jung Hee Cheon, Jovan D. Golić, David Naccache, JeanSébastien Coron, Christophe Clavier, Eric Brier, Yehuda Lindell, Oded Goldreich, Anna Lysyanskaya, Jan Camenisch, Kazue Sako, Jun Furukawa, Yael Tauman, Adi Shamir, Leonid Reyzin, Gene Itkis, Hugo Krawczyk, Chanathip Namprempre, Lars Knudsen, Alexandra Boldyreva, Mihir Bellare, Jacques Stern, David Pointcheval, Tatsuaki Okamoto, Eiichiro Fujisaki, Victor Shoup, James Manger, Igor E. Shparlinski, Dan Boneh, Scott A. Vanstone, Robert J. Lambert, Robert P. Gallant, Yehuda Lindell, Yan Zong Ding, Michael K. Reiter, Philip MacKenzie, Ivan Damgård, Ronald Cramer, Ueli Maurer, Martin Hirt, Rafail Ostrovsky, Ueli Maurer, Juan A. Garay, Matthias Fitzi, Moti Yung, Aggelos Kiayias, Jeff Lotspiech, Moni Naor, Dalit Naor, Marc Fischlin, Ran Canetti, Ke Yang, Salil Vadhan, Amit Sahai, Steven Rudich, Rusell Impagliazzo, Oded Goldreich, Boaz Barak  2001

There are 671 Citations of Chapter 25 of Differential Power Analysis J. S. Baras, R. Poovendran, Amit Sahai, Sridhar Rajagopalan, Ravi Kumar, Yuval Ishai, Benny Pinkas, Moni Naor, Amnon TaShma, Tomas Sander, Tatsuaki Okamoto, Eiichiro Fujisaki, Amit Sahai, Victor Boyko, Rafail Ostrovsky, Giovanni Di Crescenzo, Salil Vadhan, Amit Sahai, Oded Goldreich, Philip MacKenzie, Markus Jakobsson, Juan A. Garay, Sara K. Miner, Markus Michels, Jan Camenisch, Pankaj Rohatgi, Josyula R. Rao, Charanjit S. Jutla, Suresh Chari, Yiqun Lisa Yin, Jessica Staddon, Eli Gafni, Tamir Tassa, Amos Fiat, Matthew Franklin, Dan Boneh, Nick HowgraveGraham, Glenn Durfee, Dan Boneh, Dai ZongDuo, Lam KwokYan, Ye DingFeng, Don Coppersmith, Hugo Krawczyk, Oded Goldreich, Mihir Bellare, Mihir Bellare, Jee Hea An, Zulfikar Ramzan, Sarvar Patel, Mark Etzel, P. Rogaway, T. Krovetz, H. Krawczyk, S. Halevi, J. Black, Palash Sarkar, Subhamoy Maitra, Fredrik Jönsson, Thomas Johansson, David Wagner, M. J. B. Robshaw, Lars R. Knudsen, Berry Schoenmakers, Masayuki Abe, Niv Gilboa, Tal Rabin, Hugo Krawczyk, Stanisław Jarecki, Rosario Gennaro, Ran Canetti, Silvio Micali, Tal Malkin, Amos Beimel, Michael O. Rabin, Yonatan Aumann, Ueli Maurer, Jacques Stern, Phong Nguyen, Adi Shamir, Aviad Kipnis, Julien P. Stern, David Naccache, JeanSébastien Coron  1999

There are 643 Citations of Chapter 24 of Z3: An Efficient SMT Solver Nikolaj Bjørner, Leonardo de Moura  2008

There are 616 Citations of Chapter 1 of Ensemble Methods in Machine Learning Thomas G. Dietterich  2000

There are 589 Citations of Chapter 16 of PublicKey Cryptosystems Based on Composite Degree Residuosity Classes Pascal Paillier  1999

There are 518 Citations of Chapter 5 of IdentityBased Cryptosystems and Signature Schemes Adi Shamir  1985

There are 493 Citations of Chapter 14 of Firefly Algorithms for Multimodal Optimization XinShe Yang  2009

There are 276 downloads of Chapter 11 of Containerklassen der C++Standardbibliothek by Richard Kaiser  2019

There are 276 downloads of Chapter 6 of Zeiger, Strings und dynamisch erzeugte Variablen by Richard Kaiser  2019

There are 276 downloads of Chapter 8 of Objektorientierte Programmierung by Richard Kaiser  2019

There are 276 downloads of Chapter 4 of Arrays und Container by Richard Kaiser  2019

There are 276 downloads of Chapter 9 of Namensbereiche by Richard Kaiser  2019

There are 276 downloads of Chapter 14 of Templates by Richard Kaiser  2019

There are 277 downloads of Chapter 10 of ExceptionHandling by Richard Kaiser  2019

There are 276 downloads of Chapter 13 of Funktoren, Funktionsobjekte und LambdaAusdrücke by Richard Kaiser  2019

There are 276 downloads of Chapter 15 of STLAlgorithmen und LambdaAusdrücke by Richard Kaiser  2019

There are 277 downloads of Chapter 5 of Einfache selbstdefinierte Datentypen by Richard Kaiser  2019
Purchase this book
Get this bookAdvances in Cryptology – CRYPTO 2004 Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
This dialog will, depending on your institutional affiliation, allow you to purchase an ebook, purchase a print book, or download a PDF copy of the book.
When you click on the button below, you will be redirected to springer.com where you can finish shopping.
Download chapter as PDF Buy print editionChapter details
 Part of book
 Advances in Cryptology – CRYPTO 2004
 Affiliation
 DCSSI Crypto Lab, Paris 07 SP, France
 DOI
 10.1007/9783540286288_19
This book is part of an eBook collection
Computer Science