<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>how to eat food</title>
  <id>http://www.howtoeatfood.com/u/jaw/hash</id>
  <updated>2018-12-15T10:03:47-05:00</updated>
  <author>
    <name>how to eat food</name>
  </author>
  <entry>
    <title>Hash Collision Probabilities</title>
    <link rel="alternate" href="https://preshing.com/20110504/hash-collision-probabilities/"/>
    <id>8cbd1098855dd813c7445240e6939a2d</id>
    <published>2018-12-15T10:03:47-05:00</published>
    <updated>2018-12-15T10:03:47-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Hash Collision Probabilities</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Multicollisions in iterated hash functions. Applications to cascaded constructions.</title>
    <link rel="alternate" href="https://www.iacr.org/archive/crypto2004/31520306/multicollisions.pdf"/>
    <id>01b5066bb7c94a95dfb862757d47b729</id>
    <published>2017-04-26T14:09:32-04:00</published>
    <updated>2017-04-26T14:09:32-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Multicollisions in iterated hash functions. Applications to cascaded constructions.</summary>
    <content type="html">Is the concatenation of two independent hash values more secure than a single hash-value?
tl;dr: this construction is in fact insecure</content>
  </entry>
  <entry>
    <title>the historical success of collision attacks does not imply a danger of pre-image attacks</title>
    <link rel="alternate" href="https://tahoe-lafs.org/~zooko/preimage-attacks-color.html"/>
    <id>037040ff24776c798dbf3ac86fcdcb41</id>
    <published>2016-02-14T11:50:02-05:00</published>
    <updated>2016-02-14T11:50:02-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">the historical success of collision attacks does not imply a danger of pre-image attacks</summary>
    <content type="html">The main result of this investigation is that “the historical success of collision attacks does not imply a danger of pre-image attacks”.

</content>
  </entry>
  <entry>
    <title>crypt-dev - entropy loss with narrow-pipe iterated hashes</title>
    <link rel="alternate" href="http://www.openwall.com/lists/crypt-dev/2011/07/14/1"/>
    <id>09a966ed77f1ba4aebd70532afdb846f</id>
    <published>2016-01-22T15:20:21-05:00</published>
    <updated>2016-01-22T15:20:21-05:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">crypt-dev - entropy loss with narrow-pipe iterated hashes</summary>
    <content type="html"></content>
  </entry>
  <entry>
    <title>Stop using unsafe keyed hashes, use HMAC | root labs rdist</title>
    <link rel="alternate" href="http://rdist.root.org/2009/10/29/stop-using-unsafe-keyed-hashes-use-hmac/"/>
    <id>5f7c020c02319b5ab4d23d8603ba9a7e</id>
    <published>2014-09-19T12:03:29-04:00</published>
    <updated>2014-09-19T12:03:29-04:00</updated>
    <author>
      <name>jaw</name>
    </author>
    <summary type="html">Stop using unsafe keyed hashes, use HMAC | root labs rdist</summary>
    <content type="html"></content>
  </entry>
</feed>
