Search this site:



Match case Regex search

Search Results from Financial Cryptography

the Satoshi effect - Bitcoin paper success against the academic review system

One of the things that has clearly outlined the dilemma for the academic community is that papers that are self-published or "informally published" to borrow a slur from the inclusion market are making some headway, at least if the Bitcoin...
Posted in Financial Cryptography on November 15, 2015 11:34 AM

How to avoid Yesterday's Unknowns - Algorithm Agility in Protocols

Following yesterday's post, here's a today example of thinking about unknowns -- yesterday's, today's and tomorrow's. Currently the experts in crypto and protocol circles are championing "algorithm agility". Why? Because SHA1 is under a cloud, and MD5 is all-but-drowned. It...
Posted in Financial Cryptography on September 3, 2009 04:21 PM

... and then granny loses her house!

A canonical question in cryptography was about how much money you could put over a digital signature, and a proposed attack would often end, "and then Granny loses her house!" It might be seen as a sort of reminder that...
Posted in Financial Cryptography on March 15, 2009 05:58 AM

WEIS2007 - Econ Info Sec - programme announced

Follows is the Programme for WEIS2007, the annual Workshop on Economics of Information Security to be held in June 7- 8, 2007, Pittsburgh, USA....
Posted in Financial Cryptography on April 24, 2007 08:56 AM

NIST Competition to create new Hash algorithm

Buzzing around the cryptosphere for the last few years has been the name that hashes fear: Wang. The allegedly mild and timid Professor Wang has destroyed all hashes up to SHA1 itself (prior posts in FC) and even that bulwark...
Posted in Financial Cryptography on January 25, 2007 03:18 PM

SHA1 weakened further in new attacks

The move away from SHA1 gained momentum: Researchers of the Krypto group of the IAIK succeeded in constructing a collision for a simplified variant of the standard hash function SHA-1. The simplified variant differs from the standard only in the...
Posted in Financial Cryptography on August 25, 2006 05:40 PM

Notes on today's market for threats

A good article on Malware for security people to brush up their understanding. On honey clients Balrog writes (copied verbatim): In my earlier post about Microsoft’s HoneyMonkey project I mentioned that the HoneyNet Project will probably latch on and develop...
Posted in Financial Cryptography on August 20, 2005 07:54 AM

SHA1 attack updated at Crypto, US responds by stifling research

At this year's Crypto conference, a 2^63 collisions attack on SHA1 was announced by Wang, but not delivered by her personally because the US State Department would not issue her a Visa. (According to participants, Adi Shamir humourously pointed out...
Posted in Financial Cryptography on August 17, 2005 09:15 AM

Hype is free, Common Sense costs Pennies

Phishing news: puddle phishing (targetting small banks) is on the rise, as is phishing outside the US. Both of these are to be expected as phishers move around and try new things. One might suspect that the major US financial...
Posted in Financial Cryptography on June 17, 2005 11:09 AM

How to Break MD5 and Other Hash Functions

Wang and Yu have released their draft paper(s) for Eurocrypt 2005: Xiaoyun Wang and Hongbo Yu, "How to Break MD5 and Other Hash Functions" Xiaoyun Wang and Hongbo Yu, "Cryptanalysis of the Hash Functions MD4 and RIPEMD" Meanwhile, Vlastimil Klima...
Posted in Financial Cryptography on March 13, 2005 04:05 PM

Cryptographers have a Responsibility to Explain Results

I see signs of a wave of FUD spreading through the net as cryptoplumbers try and interpret the latest paper on MD5 collisions in certs from Lenstra, Wang, Weger. I didn't have time to read the paper at the time,...
Posted in Financial Cryptography on March 13, 2005 09:09 AM

Is SHA-1 Pareto-secure?

Just a week or two before the SHA-1 news from Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu, I wrote a paper on what it means to be secure. In a flash of inspiration, I hit on applying the methodology of...
Posted in Financial Cryptography on February 26, 2005 09:21 PM

Collision Search Attacks on SHA1 - the Shandong note

The note on the SHA1 attack from the team from Shandong - Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu - is now available in PDF. Firstly, it is a summary, not the real paper, so the attack is not outlined....
Posted in Financial Cryptography on February 17, 2005 08:40 AM

SHA0 is cracked

According to the below post, SHA-0 has been cracked. The researchers crunched their way through lots of data and lots of cycles and finally found some text that hashes to the same value. And people at Crypto 2004 in Santa...
Posted in Financial Cryptography on August 15, 2004 11:04 AM

FC04 - accepted papers

The Financial Cryptography 2004 conference has quietly (!) announced their accepted papers: http://fc04.ifca.ai/program.htm Click above, or read on for the full programme.......
Posted in Financial Cryptography on December 16, 2003 09:42 AM
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::site_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::site_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.
MT::App::Search=HASH(0x55f9cea2e610) Subroutine MT::Blog::SUPER::archive_url redefined at /home/iang/www/fc/cgi-bin/mt/lib/MT/Object.pm line 125.