You're seeing our new discovery page and we'd like your opinion. Tell us your feedback.
A list of tags associated with this document:
 Chapter 19
Advances in Cryptology – CRYPTO 2004 (2004): Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
 Authors:
 Antoine Joux
In this paper, we study the existence of multicollisions in iterated hash functions. We show that finding multicollisions, i.e. r tuples of messages that all hash to the same value, is not much harder than finding ordinary collisions, i.e. pairs of messages, even for extremely large values of r . More precisely, the ratio of the complexities of the attacks is approximately equal to the logarithm of r . Then, using large multicollisions as a tool, we solve a long standing open problem and prove that concatenating the results of several iterated hash functions in order to build a larger one does not yield a secure construction. We also discuss the potential impact of our attack on several published schemes. Quite surprisingly, for subtle reasons, the schemes we study happen to be immune to our attack.
Metrics
Most Downloaded Chapters
 Chapter 3 , Short Group Signatures, has 3889 Downloads
 Chapter 19 , Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions, has 2760 Downloads
 Chapter 4 , Signature Schemes and Anonymous Credentials from Bilinear Maps, has 2864 Downloads
 Chapter 32 , PrivacyPreserving Datamining on Vertically Partitioned Databases, has 1833 Downloads
 Chapter 27 , Secure Identity Based Encryption Without Random Oracles, has 1779 Downloads
Best performing chapters in Computer Science, sorted by

There are 70.2K downloads of Chapter 21315 of zeroaddress instruction by Martin H. Weik D.Sc.  2001

There are 50.5K downloads of Chapter 34 of Deep Learning via Semisupervised Embedding by Ronan Collobert, Hossein Mobahi, Frédéric Ratle, Jason Weston  2012

There are 50K downloads of Chapter 14 of Unsupervised Learning by Jerome Friedman, Robert Tibshirani, Trevor Hastie  2009

There are 48.7K downloads of Chapter 32 of A Practical Guide to Training Restricted Boltzmann Machines by Geoffrey E. Hinton  2012

There are 48K downloads of Chapter 26 of Practical Recommendations for GradientBased Training of Deep Architectures by Yoshua Bengio  2012

There are 47.8K downloads of Chapter 30 of Learning Feature Representations with KMeans by Andrew Y. Ng, Adam Coates  2012

There are 47.6K downloads of Chapter 3 of Efficient BackProp by KlausRobert Müller, Genevieve B. Orr, Léon Bottou, Yann A. LeCun  2012

There are 47.1K downloads of Chapter 2 of Overview of Supervised Learning by Jerome Friedman, Robert Tibshirani, Trevor Hastie  2009

There are 46.9K downloads of Chapter 25 of Stochastic Gradient Descent Tricks by Léon Bottou  2012

There are 46.4K downloads of Chapter 31 of Smart Cities and the Future Internet: Towards Cooperation Frameworks for Open Innovation by Alvaro Oliveira, Michael Nilsson, Brigitte Trousse, Marc Pallot, Nicos Komninos, Hans Schaffers  2011

There are 1.43K Citations of Chapter 23 of limma: Linear Models for Microarray Data G. K. Smyth  2005

There are 1.31K Citations of Chapter 32 of SURF: Speeded Up Robust Features Luc Van Gool, Tinne Tuytelaars, Herbert Bay  2006

There are 1.2K Citations of Chapter 25 of Differential Power Analysis J. S. Baras, R. Poovendran, Amit Sahai, Sridhar Rajagopalan, Ravi Kumar, Yuval Ishai, Benny Pinkas, Moni Naor, Amnon TaShma, Tomas Sander, Tatsuaki Okamoto, Eiichiro Fujisaki, Amit Sahai, Victor Boyko, Rafail Ostrovsky, Giovanni Di Crescenzo, Salil Vadhan, Amit Sahai, Oded Goldreich, Philip MacKenzie, Markus Jakobsson, Juan A. Garay, Sara K. Miner, Markus Michels, Jan Camenisch, Pankaj Rohatgi, Josyula R. Rao, Charanjit S. Jutla, Suresh Chari, Yiqun Lisa Yin, Jessica Staddon, Eli Gafni, Tamir Tassa, Amos Fiat, Matthew Franklin, Dan Boneh, Nick HowgraveGraham, Glenn Durfee, Dan Boneh, Dai ZongDuo, Lam KwokYan, Ye DingFeng, Don Coppersmith, Hugo Krawczyk, Oded Goldreich, Mihir Bellare, Mihir Bellare, Jee Hea An, Zulfikar Ramzan, Sarvar Patel, Mark Etzel, P. Rogaway, T. Krovetz, H. Krawczyk, S. Halevi, J. Black, Palash Sarkar, Subhamoy Maitra, Fredrik Jönsson, Thomas Johansson, David Wagner, M. J. B. Robshaw, Lars R. Knudsen, Berry Schoenmakers, Masayuki Abe, Niv Gilboa, Tal Rabin, Hugo Krawczyk, Stanisław Jarecki, Rosario Gennaro, Ran Canetti, Silvio Micali, Tal Malkin, Amos Beimel, Michael O. Rabin, Yonatan Aumann, Ueli Maurer, Jacques Stern, Phong Nguyen, Adi Shamir, Aviad Kipnis, Julien P. Stern, David Naccache, JeanSébastien Coron  1999

There are 1.13K Citations of Chapter 13 of IdentityBased Encryption from the Weil Pairing Giuseppe Persiano, Rafail Ostrovsky, Giovanni Di Crescenzo, Alfredo De Santis, Silvio Micali, Victor Shoup, Frank Petzold, Klaus Kursawe, Christian Cachin, Serge Fehr, Ivan Damgård, Ronald Cramer, Sang Geun Hahn, Sang Jin Lee, Eonkyung Lee, Choonsik Park, Seongtaek Chee, Jae Heon Kim, KilChan Ha, SeongHun Paeng, Jung Hee Cheon, Jovan D. Golić, David Naccache, JeanSébastien Coron, Christophe Clavier, Eric Brier, Yehuda Lindell, Oded Goldreich, Anna Lysyanskaya, Jan Camenisch, Kazue Sako, Jun Furukawa, Yael Tauman, Adi Shamir, Leonid Reyzin, Gene Itkis, Hugo Krawczyk, Chanathip Namprempre, Lars Knudsen, Alexandra Boldyreva, Mihir Bellare, Jacques Stern, David Pointcheval, Tatsuaki Okamoto, Eiichiro Fujisaki, Victor Shoup, James Manger, Igor E. Shparlinski, Dan Boneh, Scott A. Vanstone, Robert J. Lambert, Robert P. Gallant, Yehuda Lindell, Yan Zong Ding, Michael K. Reiter, Philip MacKenzie, Ivan Damgård, Ronald Cramer, Ueli Maurer, Martin Hirt, Rafail Ostrovsky, Ueli Maurer, Juan A. Garay, Matthias Fitzi, Moti Yung, Aggelos Kiayias, Jeff Lotspiech, Moni Naor, Dalit Naor, Marc Fischlin, Ran Canetti, Ke Yang, Salil Vadhan, Amit Sahai, Steven Rudich, Rusell Impagliazzo, Oded Goldreich, Boaz Barak  2001

There are 1.03K Citations of Chapter 1 of Ensemble Methods in Machine Learning Thomas G. Dietterich  2000

There are 981 Citations of Chapter 24 of Z3: An Efficient SMT Solver Nikolaj Bjørner, Leonardo de Moura  2008

There are 929 Citations of Chapter 5 of IdentityBased Cryptosystems and Signature Schemes Adi Shamir  1985

There are 893 Citations of Chapter 5 of Dynamic Source Routing in Ad Hoc Wireless Networks  1996

There are 838 Citations of Chapter 18 of Pastry: Scalable, Decentralized Object Location, and Routing for LargeScale PeertoPeer Systems Dongyan Xu, Xiaohui Gu, Klara Nahrstedt, Duangdao Wichadakul, Richard D. Schlichting, Mohan Rajagopalan, Matti A. Hiltunen, Jun He, Sacha Krakowiak, Noël De Palma, Eric Bruneton, Philippe Laumay, Walt Yao, Ken Moody, Jean Bacon, Tatsuo Nakajima, Willy Zwaenepoel, Dan S. Wallach, Mahadev Satyanarayanan, Eyal de Lara, Jason Flinn, Sung Ho Park, Jun Ho Park, Soon Ju Kang, JeanCharles Fabre, Eric Marsden, Stuart M. Wheater, Santosh K. Shrivastava, Ian Robinson, Mark C. Little, Iain Houston, Jutta Willamowski, François Pacull, Damián Arregui, Nikos Parlavantzas, Geoff Coulson, Gordon S. Blair, Michael Clarke, Hafedh Mili, Gautier Koscielny, Salah Sadou, Calton Pu, Jonathan Walpole, Jie Huang, Andrew P. Black, Rainer Koster, Nandagopal Ancha, Udiyan I. Padmanabhan, Philip K. McKinley, Arkady Zaslavsky, Seng Wai Loke, Jaga Indulska, Andry Rakotonirainy, Martina Zitterbart, Jochen Seitz, Rainer Ruggaber, Timm Reinstorf, Shuping Ran, Paul Brebner, Anand Tripathi, John Eberhard, Doug Palmer, Dean Kuo  2001

There are 792 Citations of Chapter 2 of A desiciontheoretic generalization of online learning and an application to boosting Víctor Lavín, Carlos Domingo, Alvis Brāzma, S. Varricchio, F. Bergadano, Takeshi Koshiba, Clara Shwartzman, Eli Shamir, Mostefa Golea, Angus Macintyre, Marek Karpinski, Hans Ulrich Simon, Foued Ameur, Jan C. Bioch, Jan van den Berg, Marco Muselli, Dale Schuurmans, Daniel Osherson, Eric Martin, Esko Ukkonen, Heikki Mannila, Pekka Kilpeläinen, V. G. Vovk, Pascal Koiran, Leonid Gurvits, Peter Bartlett, Martin Anthony, J. Rissanen, Sanjay Jain, Rusins Freivalds, Arun Sharma, Sanjay Jain, Carl H. Smith, Efim Kinber, Rūsiņš Freivalds, Martin Kummer, Efim Kinber, Susanne Kaufmann, John Case, Thomas Zeugmann, Steffen Lange, Montserrat Hermo, Harry Buhrman, José L. Balcázar, Andris Ambainis, Kenji Yamanishi, Manfred K. Warmuth, Jyrki Kivinen, David Haussler, Michael Lindenbaum, Shai BenDavid, Yishay Mansour, Eyal Kushilevitz, Shai BenDavid, Ray J. Solomonoff  1995

There are 115 downloads of Chapter 4 of A Novel Page Ranking Mechanism Based on User Browsing Patterns by Ashutosh Dixit, Shilpa Sethi  2019

There are 112 downloads of Chapter 8 of Performance Efficiency Assessment for Software Systems by Ashutosh Dixit, P. S. Grover, Amandeep Kaur  2019

There are 119 downloads of Chapter 16 of Noise Reduction from ECG Signal Using Error Normalized Step Size Least Mean Square Algorithm (ENSS) with Wavelet Transform by Poonam Bansal, Pradeep Kumar, Rachana Nagal  2019

There are 111 downloads of Chapter 39 of Devising a New Method for Economic Dispatch Solution and Making Use of Soft Computing Techniques to Calculate Loss Function by Aasha Chuahan, Ravindra Kumar Chahar  2019

There are 112 downloads of Chapter 55 of Automation Framework for Test Script Generation for Android Mobile by Anirban Basu, R. Anbunathan  2019

There are 117 downloads of Chapter 61 of Clustering the Patent Data Using K Means Approach by Deepti Mehrotra, Nisha Mittas, Anuranjana  2019

There are 113 downloads of Chapter 62 of Success and Failure Factors that Impact on Project Implementation Using Agile Software Development Methodology by V. B. Singh, Deepak Kumar, Saru Dhir  2019

There are 136 downloads of Chapter 41 of Navigational Complexity Metrics of a Website by Deepti Mehrotra, Renuka Nagpal, Divyam Pandey  2019

There are 110 downloads of Chapter 9 of Impact of Programming Languages on Energy Consumption for Sorting Algorithms by Anuj Kumar Dwivedi, Pushpak Verma, Tej Bahadur Chandra  2019

There are 118 downloads of Chapter 3 of A Multifactored Cost and Code CoverageBased Test Case Prioritization Technique for ObjectOriented Software by Naresh Chauhan, Vedpal  2019
Purchase this book
Get this bookAdvances in Cryptology – CRYPTO 2004 Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions
This dialog will, depending on your institutional affiliation, allow you to purchase an ebook, purchase a print book, or download a PDF copy of the book.
When you click on the button below, you will be redirected to springer.com where you can finish shopping.
Download chapter as PDF Buy print editionChapter details
 Part of book
 Advances in Cryptology – CRYPTO 2004
 Affiliation
 DCSSI Crypto Lab, Paris 07 SP, France
 DOI
 10.1007/9783540286288_19
This book is part of an eBook collection
Computer Science