[Resource Topic] 2011/307: Ways to restrict the differential path

Welcome to the resource topic for 2011/307

Ways to restrict the differential path

Authors: ZiJie Xu, Ke Xu


People had developed some attack methods to attack hash function. These methods need to choose some “differential pattern”[Dau05]. We present a way to restrict the collisions that hold the “differential pattern”. At the same time, to build a hash function that meet the different needs, we propose a construction.

ePrint: https://eprint.iacr.org/2011/307

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .