Results 1 
2 of
2
New Parallel Domain Extenders for UOWHF
 Lecture Notes in Computer Science
"... Abstract. We present two new parallel algorithms for extending the domain of a UOWHF. The first algorithm is complete binary tree based construction and has less key length expansion than Sarkar’s construction which is the previously best known complete binary tree based construction. But only disad ..."
Abstract

Cited by 3 (1 self)
 Add to MetaCart
(Show Context)
Abstract. We present two new parallel algorithms for extending the domain of a UOWHF. The first algorithm is complete binary tree based construction and has less key length expansion than Sarkar’s construction which is the previously best known complete binary tree based construction. But only disadvantage is that here we need more key length expansion than that of Shoup’s sequential algorithm. But it is not too large as in all practical situations we need just two more masks than Shoup’s. Our second algorithm is based on noncomplete lary tree and has the same optimal key length expansion as Shoup’s which has the most efficient key length expansion known so far. Using the recent result [9], we can also prove that the key length expansion of this algorithm and Shoup’s sequential algorithm are the minimum possible for any algorithms in a large class of “natural ” domain extending algorithms. But its parallelizability performance is less efficient than complete tree based constructions. However if l is getting larger, then the parallelizability of the construction is also getting near to that of complete tree based constructions. We also give a sufficient condition for valid domain extension in sequential domain extension.
PAPER Special Section on Cryptography and Information Security PGVStyle BlockCipherBased Hash Families and BlackBox Analysis
, 2005
"... SUMMARY In [1] it was proved that 20 of 64 PGV hash functions [2] based on block cipher are collisionresistant and oneway in the blackbox model of the underlying block cipher. Here, we generalize the definition of PGVhash function into a hash family and we will prove that, aside from the previou ..."
Abstract
 Add to MetaCart
SUMMARY In [1] it was proved that 20 of 64 PGV hash functions [2] based on block cipher are collisionresistant and oneway in the blackbox model of the underlying block cipher. Here, we generalize the definition of PGVhash function into a hash family and we will prove that, aside from the previously reported 20 hash functions, we have 22 more collisionresistant and oneway hash families. As all these 42 families are keyed hash family, these are also targetcollisionresistant. All these 42 hash families have tight upper and lower bounds on (target) collisionresistant and onewayness. key words: hash function, block cipher, blackbox model, provable security 1.