Black-box analysis of the block-cipher-based hash-function constructions from pgv (2002)

by John Black , Phillip Rogaway , Thomas Shrimpton
Venue:In Advances in Cryptology – CRYPTO ’02 (2002
Citations:112 - 15 self

Active Bibliography

3 Blockcipher Based Hashing Revisited – Martijn Stam - 2009
15 Building a collision-resistant compression function from non-compressing primitives – Thomas Shrimpton, Martijn Stam - 2008
Security Analysis and Comparison of the SHA-3 Finalists – Elena Andreeva, Bart Mennink, Bart Preneel, Marjan ˇ Skrobot
19 Constructing cryptographic hash functions from fixed-key blockciphers. Full version of this paper – Phillip Rogaway, John Steinberger - 2008
5 On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model – M. R. Albrecht, P. Farshim, K. G. Paterson, G. J. Watson
15 Pseudorandom Functions and Permutations Provably Secure Against Related-Key Attacks – Mihir Bellare, David Cash - 2010
4 Adaptive Preimage Resistance and Permutation-based Hash Functions. Available at – Jooyoung Lee, Je Hong Park
Towards Understanding the Known-Key Security of Block Ciphers – Elena Andreeva, Andrey Bogdanov, Bart Mennink
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008
6 On the relation between the ideal cipher and the random oracle models – Yevgeniy Dodis, Prashant Puniya - 2006
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
Efficient Hashing using the AES Instruction Set – Onur Özen, Martijn Stam
11 Careful with composition: Limitations of the indifferentiability framework – Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton - 2011
5 A new mode of operation for block ciphers and length-preserving MACs – Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya - 2008
Grøstl Addendum – Praveen Gauravaram, Lars R. Knudsen, Krystian Matusiewicz, Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen - 2009
A unified indifferentiability proof for . . . – Anne Canteaut, Thomas Fuhr, et al.
3 Revisiting the Indifferentiability of PGV Hash Functions – Yiyuan Luo, Zheng Gong, Ming Duan, Bo Zhu, Xuejia Lai - 2009
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
59 Multi-Property-Preserving Hash Domain Extension and the EMD Transform – Mihir Bellare, Thomas Ristenpart - 2006