Black-box analysis of the block-cipher-based hash-function constructions from pgv (2002)

by John Black , Phillip Rogaway , Thomas Shrimpton
Venue:In Advances in Cryptology – CRYPTO ’02 (2002
Citations:103 - 15 self

Active Bibliography

3 Blockcipher Based Hashing Revisited – Martijn Stam - 2009
15 Building a collision-resistant compression function from non-compressing primitives – Thomas Shrimpton, Martijn Stam - 2008
Security Analysis and Comparison of the SHA-3 Finalists – Elena Andreeva, Bart Mennink, Bart Preneel, Marjan ˇ Skrobot
18 Constructing cryptographic hash functions from fixed-key blockciphers. Full version of this paper – Phillip Rogaway, John Steinberger - 2008
13 Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks – Mihir Bellare, David Cash - 2010
5 On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model – M. R. Albrecht, P. Farshim, K. G. Paterson, G. J. Watson
4 Adaptive Preimage Resistance and Permutation-based Hash Functions. Available at http://eprint.iacr.org/2009/066 – Jooyoung Lee, Je Hong Park
Towards Understanding the Known-Key Security of Block Ciphers – Elena Andreeva, Andrey Bogdanov, Bart Mennink
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008
6 On the relation between the ideal cipher and the random oracle models – Yevgeniy Dodis, Prashant Puniya - 2006
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
Efficient Hashing using the AES Instruction Set – Onur Özen, Martijn Stam
11 Careful with composition: Limitations of the indifferentiability framework – Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton - 2011
5 A new mode of operation for block ciphers and length-preserving MACs – Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya - 2008
Grøstl Addendum – Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen - 2009
A unified indifferentiability proof for . . . – Anne Canteaut, Thomas Fuhr, et al.
3 Revisiting the Indifferentiability of PGV Hash Functions – Yiyuan Luo, Zheng Gong, Ming Duan, Bo Zhu, Xuejia Lai - 2009
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
11 How to Build a Hash Function from any Collision-Resistant Function – Thomas Ristenpart, Thomas Shrimpton - 2007