You're seeing our new discovery page and we'd like your opinion. Tell us your feedback.
A list of tags associated with this document:
 Chapter 19
Advances in Cryptology – CRYPTO 2004 (2004): Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
 Authors:
 Antoine Joux
In this paper, we study the existence of multicollisions in iterated hash functions. We show that finding multicollisions, i.e. r tuples of messages that all hash to the same value, is not much harder than finding ordinary collisions, i.e. pairs of messages, even for extremely large values of r . More precisely, the ratio of the complexities of the attacks is approximately equal to the logarithm of r . Then, using large multicollisions as a tool, we solve a long standing open problem and prove that concatenating the results of several iterated hash functions in order to build a larger one does not yield a secure construction. We also discuss the potential impact of our attack on several published schemes. Quite surprisingly, for subtle reasons, the schemes we study happen to be immune to our attack.
Metrics
Most Downloaded Chapters
 Chapter 3 , Short Group Signatures, has 4000 Downloads
 Chapter 19 , Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, has 2818 Downloads
 Chapter 4 , Signature Schemes and Anonymous Credentials from Bilinear Maps, has 3006 Downloads
 Chapter 32 , PrivacyPreserving Datamining on Vertically Partitioned Databases, has 1874 Downloads
 Chapter 27 , Secure Identity Based Encryption Without Random Oracles, has 1835 Downloads
Best performing chapters in Computer Science, sorted by

There are 74.7K downloads of Chapter 21315 of zeroaddress instruction by Martin H. Weik D.Sc.  2001

There are 52.4K downloads of Chapter 14 of Unsupervised Learning by Jerome Friedman, Robert Tibshirani, Trevor Hastie  2009

There are 51.2K downloads of Chapter 34 of Deep Learning via Semisupervised Embedding by Ronan Collobert, Hossein Mobahi, Frédéric Ratle, Jason Weston  2012

There are 49.3K downloads of Chapter 32 of A Practical Guide to Training Restricted Boltzmann Machines by Geoffrey E. Hinton  2012

There are 49.1K downloads of Chapter 2 of Overview of Supervised Learning by Jerome Friedman, Robert Tibshirani, Trevor Hastie  2009

There are 48.7K downloads of Chapter 26 of Practical Recommendations for GradientBased Training of Deep Architectures by Yoshua Bengio  2012

There are 48.4K downloads of Chapter 30 of Learning Feature Representations with KMeans by Andrew Y. Ng, Adam Coates  2012

There are 48.4K downloads of Chapter 3 of Linear Methods for Regression by Jerome Friedman, Robert Tibshirani, Trevor Hastie  2009

There are 48.4K downloads of Chapter 1 of Introduction by Jerome Friedman, Robert Tibshirani, Trevor Hastie  2009

There are 48.3K downloads of Chapter 3 of Efficient BackProp by KlausRobert Müller, Genevieve B. Orr, Léon Bottou, Yann A. LeCun  2012

There are 1.5K Citations of Chapter 23 of limma: Linear Models for Microarray Data G. K. Smyth  2005

There are 1.34K Citations of Chapter 32 of SURF: Speeded Up Robust Features Luc Van Gool, Tinne Tuytelaars, Herbert Bay  2006

There are 1.21K Citations of Chapter 25 of Differential Power Analysis J. S. Baras, R. Poovendran, Amit Sahai, Sridhar Rajagopalan, Ravi Kumar, Yuval Ishai, Benny Pinkas, Moni Naor, Amnon TaShma, Tomas Sander, Tatsuaki Okamoto, Eiichiro Fujisaki, Amit Sahai, Victor Boyko, Rafail Ostrovsky, Giovanni Di Crescenzo, Salil Vadhan, Amit Sahai, Oded Goldreich, Philip MacKenzie, Markus Jakobsson, Juan A. Garay, Sara K. Miner, Markus Michels, Jan Camenisch, Pankaj Rohatgi, Josyula R. Rao, Charanjit S. Jutla, Suresh Chari, Yiqun Lisa Yin, Jessica Staddon, Eli Gafni, Tamir Tassa, Amos Fiat, Matthew Franklin, Dan Boneh, Nick HowgraveGraham, Glenn Durfee, Dan Boneh, Dai ZongDuo, Lam KwokYan, Ye DingFeng, Don Coppersmith, Hugo Krawczyk, Oded Goldreich, Mihir Bellare, Mihir Bellare, Jee Hea An, Zulfikar Ramzan, Sarvar Patel, Mark Etzel, P. Rogaway, T. Krovetz, H. Krawczyk, S. Halevi, J. Black, Palash Sarkar, Subhamoy Maitra, Fredrik Jönsson, Thomas Johansson, David Wagner, M. J. B. Robshaw, Lars R. Knudsen, Berry Schoenmakers, Masayuki Abe, Niv Gilboa, Tal Rabin, Hugo Krawczyk, Stanisław Jarecki, Rosario Gennaro, Ran Canetti, Silvio Micali, Tal Malkin, Amos Beimel, Michael O. Rabin, Yonatan Aumann, Ueli Maurer, Jacques Stern, Phong Nguyen, Adi Shamir, Aviad Kipnis, Julien P. Stern, David Naccache, JeanSébastien Coron  1999

There are 1.13K Citations of Chapter 13 of IdentityBased Encryption from the Weil Pairing Giuseppe Persiano, Rafail Ostrovsky, Giovanni Di Crescenzo, Alfredo De Santis, Silvio Micali, Victor Shoup, Frank Petzold, Klaus Kursawe, Christian Cachin, Serge Fehr, Ivan Damgård, Ronald Cramer, Sang Geun Hahn, Sang Jin Lee, Eonkyung Lee, Choonsik Park, Seongtaek Chee, Jae Heon Kim, KilChan Ha, SeongHun Paeng, Jung Hee Cheon, Jovan D. Golić, David Naccache, JeanSébastien Coron, Christophe Clavier, Eric Brier, Yehuda Lindell, Oded Goldreich, Anna Lysyanskaya, Jan Camenisch, Kazue Sako, Jun Furukawa, Yael Tauman, Adi Shamir, Leonid Reyzin, Gene Itkis, Hugo Krawczyk, Chanathip Namprempre, Lars Knudsen, Alexandra Boldyreva, Mihir Bellare, Jacques Stern, David Pointcheval, Tatsuaki Okamoto, Eiichiro Fujisaki, Victor Shoup, James Manger, Igor E. Shparlinski, Dan Boneh, Scott A. Vanstone, Robert J. Lambert, Robert P. Gallant, Yehuda Lindell, Yan Zong Ding, Michael K. Reiter, Philip MacKenzie, Ivan Damgård, Ronald Cramer, Ueli Maurer, Martin Hirt, Rafail Ostrovsky, Ueli Maurer, Juan A. Garay, Matthias Fitzi, Moti Yung, Aggelos Kiayias, Jeff Lotspiech, Moni Naor, Dalit Naor, Marc Fischlin, Ran Canetti, Ke Yang, Salil Vadhan, Amit Sahai, Steven Rudich, Rusell Impagliazzo, Oded Goldreich, Boaz Barak  2001

There are 1.04K Citations of Chapter 1 of Ensemble Methods in Machine Learning Thomas G. Dietterich  2000

There are 1.03K Citations of Chapter 24 of Z3: An Efficient SMT Solver Nikolaj Bjørner, Leonardo de Moura  2008

There are 941 Citations of Chapter 5 of IdentityBased Cryptosystems and Signature Schemes Adi Shamir  1985

There are 893 Citations of Chapter 5 of Dynamic Source Routing in Ad Hoc Wireless Networks  1996

There are 845 Citations of Chapter 18 of Pastry: Scalable, Decentralized Object Location, and Routing for LargeScale PeertoPeer Systems Dongyan Xu, Xiaohui Gu, Klara Nahrstedt, Duangdao Wichadakul, Richard D. Schlichting, Mohan Rajagopalan, Matti A. Hiltunen, Jun He, Sacha Krakowiak, Noël De Palma, Eric Bruneton, Philippe Laumay, Walt Yao, Ken Moody, Jean Bacon, Tatsuo Nakajima, Willy Zwaenepoel, Dan S. Wallach, Mahadev Satyanarayanan, Eyal de Lara, Jason Flinn, Sung Ho Park, Jun Ho Park, Soon Ju Kang, JeanCharles Fabre, Eric Marsden, Stuart M. Wheater, Santosh K. Shrivastava, Ian Robinson, Mark C. Little, Iain Houston, Jutta Willamowski, François Pacull, Damián Arregui, Nikos Parlavantzas, Geoff Coulson, Gordon S. Blair, Michael Clarke, Hafedh Mili, Gautier Koscielny, Salah Sadou, Calton Pu, Jonathan Walpole, Jie Huang, Andrew P. Black, Rainer Koster, Nandagopal Ancha, Udiyan I. Padmanabhan, Philip K. McKinley, Arkady Zaslavsky, Seng Wai Loke, Jaga Indulska, Andry Rakotonirainy, Martina Zitterbart, Jochen Seitz, Rainer Ruggaber, Timm Reinstorf, Shuping Ran, Paul Brebner, Anand Tripathi, John Eberhard, Doug Palmer, Dean Kuo  2001

There are 801 Citations of Chapter 2 of A desiciontheoretic generalization of online learning and an application to boosting Víctor Lavín, Carlos Domingo, Alvis Brāzma, S. Varricchio, F. Bergadano, Takeshi Koshiba, Clara Shwartzman, Eli Shamir, Mostefa Golea, Angus Macintyre, Marek Karpinski, Hans Ulrich Simon, Foued Ameur, Jan C. Bioch, Jan van den Berg, Marco Muselli, Dale Schuurmans, Daniel Osherson, Eric Martin, Esko Ukkonen, Heikki Mannila, Pekka Kilpeläinen, V. G. Vovk, Pascal Koiran, Leonid Gurvits, Peter Bartlett, Martin Anthony, J. Rissanen, Sanjay Jain, Rusins Freivalds, Arun Sharma, Sanjay Jain, Carl H. Smith, Efim Kinber, Rūsiņš Freivalds, Martin Kummer, Efim Kinber, Susanne Kaufmann, John Case, Thomas Zeugmann, Steffen Lange, Montserrat Hermo, Harry Buhrman, José L. Balcázar, Andris Ambainis, Kenji Yamanishi, Manfred K. Warmuth, Jyrki Kivinen, David Haussler, Michael Lindenbaum, Shai BenDavid, Yishay Mansour, Eyal Kushilevitz, Shai BenDavid, Ray J. Solomonoff  1995

There are 196 downloads of Chapter 11 of Efficient Management of Web Data by Applying Web Mining Preprocessing Methodologies by Kanwal Garg, Jaswinder Kaur  2019

There are 214 downloads of Chapter 5 of Indexing of Semantic Web for Efficient Question Answering System by Poonam Bhatia, Ashutosh Dixit, A. K. Sharma, Rosy Madaan  2019

There are 202 downloads of Chapter 16 of Noise Reduction from ECG Signal Using Error Normalized Step Size Least Mean Square Algorithm (ENSS) with Wavelet Transform by Poonam Bansal, Pradeep Kumar, Rachana Nagal  2019

There are 192 downloads of Chapter 39 of Devising a New Method for Economic Dispatch Solution and Making Use of Soft Computing Techniques to Calculate Loss Function by Aasha Chuahan, Ravindra Kumar Chahar  2019

There are 200 downloads of Chapter 8 of Performance Efficiency Assessment for Software Systems by Ashutosh Dixit, P. S. Grover, Amandeep Kaur  2019

There are 193 downloads of Chapter 37 of Maintainability Analysis of ComponentBased Software Architecture by Nitin Upadhyay  2019

There are 194 downloads of Chapter 4 of A Novel Page Ranking Mechanism Based on User Browsing Patterns by Ashutosh Dixit, Shilpa Sethi  2019

There are 216 downloads of Chapter 6 of A Sprint Point Based Tool for Agile Estimation by Naresh Chauhan, Rashmi Popli  2019

There are 191 downloads of Chapter 66 of Research Challenges of Web Service Composition by Deepak Kumar, Ali A. Alwasouf  2019

There are 190 downloads of Chapter 36 of Limitations of Function Point Analysis in Multimedia Software/Application Estimation by Rajiv Nag, Ravi Rastogi, Sushil Kumar  2019
Purchase this book
Get this bookAdvances in Cryptology – CRYPTO 2004 Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
This dialog will, depending on your institutional affiliation, allow you to purchase an ebook, purchase a print book, or download a PDF copy of the book.
When you click on the button below, you will be redirected to springer.com where you can finish shopping.
Download chapter as PDF Buy print editionChapter details
 Part of book
 Advances in Cryptology – CRYPTO 2004
 Affiliation
 DCSSI Crypto Lab, Paris 07 SP, France
 DOI
 10.1007/9783540286288_19
This book is part of an eBook collection
Computer Science