Manuscript Received July 2011; Accepted Feb. 2012. This work is supported by the National Natural Science Foundation of China (No.61100201, No.60773092, No.61073149, No. 61133014, No.60973111) and Foundation Distinguished Young Talents in Higher Education of Guangdong (No.LYMl1053).
The security of double-block-length hash functions with rate 1, which are based on a block cipher with a block length of n bits and a key length of 2n bits, was analyzed by Satoh et al. and Hirose. In this paper, we r...
supported by the National Natural Science Foundation of China (60573032,60773092 and 61073149);Research Fund for the Doctoral Program of Higher Education of China (20090073110027)
Keccak is one of the five hash functions selected for the final round of the SHA-3 competition,and its inner primitive is a permutation called Keccak-f.In this paper,we observe that for the inverse of the only nonline...
the National Natural Science Foundation of China (Nos.60573032,60773092 and 61073149);the Research Fund for the Doctoral Program of Higher Education of China (No.20090073110027);the Fund for the Key Laboratory of Information Network Secuity of Ministry of Public Security
HAVAL is a hash function proposed by Zheng et al.in 1992,including 3-,4-and 5-pass versions.We improve pseudo-preimage and preimage attacks on 3-pass HAVAL at the complexity of 2 172 and 2 209.6,respectively,as compar...
Project (Nos 60573032, 60773092, 60842002, 60873229, and 90604036) supported by the National Natural Science Foundation of China
Leakage of the private key has become a serious problem of menacing the cryptosystem security. To reduce the underlying danger induced by private key leakage, Dodis et al.(2003) proposed the first key-insulated signat...
Supported by the National Natural Science Foundation of China (No. 60573032, 60773092, 90604036, 60873229, 60903178, 60672072, 60832003);Zhejiang Provincial Natural Science Foundation of China (No. Y106505)
In proxy signature schemes,the proxy signer B is permitted to produce a signature on behalf of the original signer A. However,exposure of proxy signing keys can be the most devastating attack on a proxy signature sche...
the National Natural Science Foundationof China(Nos.60573032,60773092,90604036);the National High Technology Research and Development Program(863)of China(No.2007AA01Z456)
Multivariate hash functions are a type of hash functions whose compression function is explicitly defined as a sequence of multivariate equations. Billet et al designed the hash function MQ-HASH and Ding et al propose...
the National Natural Science Foundation of China(Nos.60573032,60773092,90604036)
To describe the design approaches of IND-CCA2 (adaptive chosen ciphertext attack) secure public key encryption schemes systematically, the gaps between different kinds of intractable problems and IND-CCA2 security a...
the National Natural Science Foundation of China (Nos. 60573032, 60773092, 90604036,90704004)
In proxy signature schemes, an original signer A delegates its signing capability to a proxy signer B, in such a way that B can sign message on behalf of A.The recipient of the final message verifies at the same time ...