Results 1  10
of
465,158
BlackBox Analysis of the BlockCipherBased
 In Advances in Cryptology – CRYPTO ’02 (2002
, 2002
"... Preneel, Govaerts, and Vandewalle [7] considered the 64 most basic ways to construct a hash function H : f0; 1g from a block cipher E: f0; 1g . They regarded 12 of these 64 schemes as secure, though no proofs or formal claims were given. The remaining 52 schemes were shown to be subje ..."
Abstract
 Add to MetaCart
their security as oneway functions. We suggest that proving blackbox bounds, of the style given here, is a feasible and useful step for understanding the security of any blockcipherbased hashfunction construction.
Blackbox analysis of the blockcipherbased hashfunction constructions from pgv
 In Advances in Cryptology – CRYPTO ’02 (2002
, 2002
"... Abstract. Preneel, Govaerts, and Vandewalle [6] considered the 64 most basic ways to construct a hash function H: {0, 1} ∗ →{0, 1} n from a block cipher E: {0, 1} n ×{0, 1} n →{0, 1} n. They regarded 12 of these 64 schemes as secure, though no proofs or formal claims were given. The remaining 52 sc ..."
Abstract

Cited by 126 (16 self)
 Add to MetaCart
by bounding their security as oneway functions. We suggest that proving blackbox bounds, of the style given here, is a feasible and useful step for understanding the security of any blockcipherbased hashfunction construction. 1
PAPER Special Section on Cryptography and Information Security PGVStyle BlockCipherBased Hash Families and BlackBox Analysis
, 2005
"... SUMMARY In [1] it was proved that 20 of 64 PGV hash functions [2] based on block cipher are collisionresistant and oneway in the blackbox model of the underlying block cipher. Here, we generalize the definition of PGVhash function into a hash family and we will prove that, aside from the previou ..."
Abstract
 Add to MetaCart
SUMMARY In [1] it was proved that 20 of 64 PGV hash functions [2] based on block cipher are collisionresistant and oneway in the blackbox model of the underlying block cipher. Here, we generalize the definition of PGVhash function into a hash family and we will prove that, aside from
A Synthetic Indifferentiability Analysis of Some BlockCipherBased Hash Functions
, 2007
"... At ASIACRYPT’06, Chang et al. analyzed the indifferentiability of some popular hash functions based on block ciphers, namely, the twenty collision resistant PGV, the MDC2 and the PBGV hash functions, etc. In particular, two indifferentiable attacks were presented on the four of the twenty collision ..."
Abstract

Cited by 5 (2 self)
 Add to MetaCart
resistant PGV and the PBGV hash functions with the prefixfree padding. In this article, a synthetic indifferentiability analysis of some blockcipherbased hash functions is considered. First, a more precise definition is proposed on the indifferentiability adversary in blockcipherbased hash functions
IdealCipher (Ir)reducibility for BlockcipherBased Hash Functions
"... Abstract. Preneel et al. (Crypto 1993) assessed 64 possible ways to construct a compression function out of a blockcipher. They conjectured that 12 out of these 64 socalled PGV constructions achieve optimal security bounds for collision resistance and preimage resistance. This was proven by Black e ..."
Abstract
 Add to MetaCart
construction secure also makes all others secure. Across the groups this is provably not the case, showing that the sets of “good ” blockciphers for each group are qualitatively distinct. We also relate the ideal ciphers in the PGV constructions with those in doubleblocklength hash functions such as Tandem
The IdealCipher Model, Revisited: An Uninstantiable BlockcipherBased Hash Function
 FSE’06, LNCS 4047
, 2005
"... The IdealCipher Model of a blockcipher is a wellknown and widelyused model dating back to Shannon [24] and has seen frequent use in proving the security of various cryptographic objects and protocols. But very little discussion has transpired regarding the meaning of proofs conducted in this m ..."
Abstract

Cited by 20 (1 self)
 Add to MetaCart
The IdealCipher Model of a blockcipher is a wellknown and widelyused model dating back to Shannon [24] and has seen frequent use in proving the security of various cryptographic objects and protocols. But very little discussion has transpired regarding the meaning of proofs conducted
Visualization of Hashfunctions
"... den angegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus Quellen entnommen wurden, sind als solche kenntlich gemacht. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, den 26.06.2012 (T. Kilian) Contents ..."
Abstract
 Add to MetaCart
den angegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus Quellen entnommen wurden, sind als solche kenntlich gemacht. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, den 26.06.2012 (T. Kilian) Contents
The Lifting Scheme: A Construction Of Second Generation Wavelets
, 1997
"... . We present the lifting scheme, a simple construction of second generation wavelets, wavelets that are not necessarily translates and dilates of one fixed function. Such wavelets can be adapted to intervals, domains, surfaces, weights, and irregular samples. We show how the lifting scheme leads to ..."
Abstract

Cited by 541 (16 self)
 Add to MetaCart
. We present the lifting scheme, a simple construction of second generation wavelets, wavelets that are not necessarily translates and dilates of one fixed function. Such wavelets can be adapted to intervals, domains, surfaces, weights, and irregular samples. We show how the lifting scheme leads
A Generalization of PGVHash Functions and Security Analysis in BlackBox Model
, 2004
"... In [1] it was proved that 20 out of 64 PGVhash functions [2] based on block cipher are collision resistant and onewaysecure in blackbox model of the underlying block cipher. Here, we generalize the de  nition of PGVhash function into a hash family and we will prove that besides the previou ..."
Abstract

Cited by 2 (2 self)
 Add to MetaCart
In [1] it was proved that 20 out of 64 PGVhash functions [2] based on block cipher are collision resistant and onewaysecure in blackbox model of the underlying block cipher. Here, we generalize the de  nition of PGVhash function into a hash family and we will prove that besides
Results 1  10
of
465,158