Multi-Property-Preserving Hash Domain Extension and the EMD Transform (2006)

Cached

Download Links

by Mihir Bellare , Thomas Ristenpart
Venue:Advances in Cryptology – ASIACRYPT 2006
Citations:59 - 7 self

Documents Related by Co-Citation

289 A Design Principle for Hash Functions – Ivan Damg˚ard - 1990
74 Merkle-Damg˚ard Revisited: How to Construct a Hash Function – Jean-sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya
71 Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology – Ueli Maurer, Renato Renner, Clemens Holenstein - 2004
71 Hash functions based on block ciphers: A synthetic approach – Bart Preneel, René Govaerts, Joos Vandewalle - 1993
103 Black-box analysis of the block-cipher-based hash-function constructions from pgv – John Black, Phillip Rogaway, Thomas Shrimpton - 2002
42 A failure-friendly design principle for hash functions – Stefan Lucks - 2005
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
175 One way hash functions and DES – R Merkle - 1990
13 M.: Indifferentiable security analysis of popular hash functions with prefix-free padding – Donghoon Chang, Sangjin Lee, Mridul N, Moti Yung - 2006
93 Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions – A Joux - 2004
214 How to break MD5 and other hash functions – Xiaoyun Wang, Hongbo Yu - 2005
48 Assche, On the Indifferentiability of the Sponge Construction – Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van - 2008
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
92 Pseudorandom functions revisited: The cascade construction and its concrete security – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
82 New proofs for NMAC and HMAC: Security without collision-resistance – Mihir Bellare - 2006
243 The Random Oracle Methodology, Revisited – Ran Canetti, Oded Goldreich, Shai Halevi - 1998
35 Some Plausible Constructions of Double-Block-Length Hash Functions – Shoichi Hirose - 2006
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
13 Single-Key AIL-MACs from Any FIL-MAC – Ueli M Maurer, Johan Sjödin