Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input
In the real-world applications, the overwhelming majority of cases require hashing with relatively short input, say up to 2K bytes. The length of almost all TCP/IP packets is between 40 to 1.5K bytes, and the maximum packet lengths of major protocols, e.g., Zigbee, Bluetooth low energy, and Control...
Main Authors: | Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2023-03-01
|
Series: | Transactions on Cryptographic Hardware and Embedded Systems |
Subjects: | |
Online Access: | https://tches.iacr.org/index.php/TCHES/article/view/10279 |
Similar Items
-
Permutation-Based Hashing Beyond the Birthday Bound
by: Charlotte Lefevre, et al.
Published: (2024-03-01) -
Efficient constructions for large‐state block ciphers based on AES New Instructions
by: Rentaro Shiba, et al.
Published: (2022-05-01) -
Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications
by: Stefan Kölbl, et al.
Published: (2017-02-01) -
Integral and impossible‐differential attacks on the reduced‐round Lesamnta‐LW‐BC
by: Rentaro Shiba, et al.
Published: (2022-03-01) -
Trojan message attack on the concatenated hash functions
by: Shi-Wei CHEN, et al.
Published: (2016-08-01)