Chaos Communication Congress
Chaos Communication Congress
Provable Insecurity (36x104)
: 29, 2019
(where artifacts come from, and how constructive math may help)
Cryptographic hash functions are everywhere, yet modeling the characteristics of their real-world occurrences is surprisingly complicated when trying to prove security. We argue how seemingly convenient features of doing classical math may make it actually harder to model them correctly.