Chaos Communication Congress

Chaos Communication Congress

Provable Insecurity (36x104)


: 29, 2019

(where artifacts come from, and how constructive math may help) Cryptographic hash functions are everywhere, yet modeling the characteristics of their real-world occurrences is surprisingly complicated when trying to prove security. We argue how seemingly convenient features of doing classical math may make it actually harder to model them correctly.

  • : 2011
  • : 1118
  • : 0