Haraka v2 – Efficient Short-Input Hashing for Post-Quantum Applications
Recently, many efficient cryptographic hash function design strategies have been explored, not least because of the SHA-3 competition. These designs are, almost exclusively, geared towards high performance on long inputs. However, various applications exist where the performance on short (fixed leng...
Main Authors: | Stefan Kölbl, Martin M. Lauridsen, Florian Mendel, Christian Rechberger |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2017-02-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/563 |
Similar Items
-
Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
by: Zhenzhen Bao, et al.
Published: (2020-01-01) -
A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase
by: Yongseong Lee, et al.
Published: (2023-01-01) -
A Hash-Based Quantum-Resistant Chameleon Signature Scheme
by: P. Thanalakshmi, et al.
Published: (2021-12-01) -
HORSIC+: An Efficient Post-Quantum Few-Time Signature Scheme
by: Jaeheung Lee, et al.
Published: (2021-08-01) -
A Hash-Based Quantum-Resistant Designated Verifier Signature Scheme
by: P. Thanalakshmi, et al.
Published: (2022-05-01)