Multi-Property-Preserving Hash Domain Extension and the EMD Transform (2006)

Cached

Download Links

by Mihir Bellare , Thomas Ristenpart
Venue:Advances in Cryptology – ASIACRYPT 2006
Citations:59 - 7 self

Active Bibliography

13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
Prashant PuniyaThe Random Oracle Methodology – Jean-sebastien Coron, Yevgeniy Dodis, Cecile Malinaud
74 Merkle-Damg˚ard Revisited: How to Construct a Hash Function – Jean-sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya
Security of Practical Cryptosystems Using Merkle-Damg˚ard Hash Function in the Ideal Cipher Model – Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta, Mitsubishi Electoric Corporation
Instantiating Random Oracles via UCEs – Mihir Bellare, Viet Tung, Hoang Sriram Keelveedhi - 2013
3 A critical look at cryptographic hash function literature – Scott Contini, Ron Steinfeld, Josef Pieprzyk, Krystian Matusiewicz - 2007
Provable Security Support . . . – Mihir Bellare, Tadayoshi Kohno, Stefan Lucks, Niels Ferguson, Bruce Schneier, Doug Whiting, Jon Callas, Jesse Walker - 2009
5 Provable Security Support for the Skein Hash Family – Mihir Bellare, et al. - 2009
11 How to Build a Hash Function from any Collision-Resistant Function – Thomas Ristenpart, Thomas Shrimpton - 2007
2 S.: Some observations on indifferentiability – Ewan Fleischmann, Michael Gorski, Stefan Lucks - 2010
An Update on the Analysis and Design of NMAC and HMAC Functions – Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai - 2006
2 3C -- A Provably Secure Pseudorandom Function and Message Authentication Code. A New mode of operation for Cryptographic Hash Function – Praveen Gauravaram, William Millan, Juanma Gonzalez Neito, Edward Dawson - 2005
The Skein Hask Function Family – Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker - 2009
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension – Donghoon Chang, Seokhie Hong, Jaechul Sung, Sangjin Lee
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008
On the Indifferentiability of the Integrated-Key Hash Functions – Saif Al-kuwari
Security Analysis and Comparison of the SHA-3 Finalists – Elena Andreeva, Bart Mennink, Bart Preneel, Marjan ˇ Skrobot
2 A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical – Anja Lehmann, Stefano Tessaro - 2009
11 How Risky is the Random-Oracle Model? – Gaëtan Leurent, Phong Q. Nguyen