How to Build a Hash Function from any Collision-Resistant Function (2007)

by Thomas Ristenpart , Thomas Shrimpton
Citations:12 - 3 self

Documents Related by Co-Citation

104 Black-box analysis of the block-cipher-based hash-function constructions from pgv – John Black, Phillip Rogaway, Thomas Shrimpton - 2002
19 Constructing cryptographic hash functions from fixed-key blockciphers. Full version of this paper – Phillip Rogaway, John Steinberger - 2008
52 Assche, G.: On the Indifferentiability of the Sponge Construction – G Bertoni, J Daemen, M Peeters, Van - 2008
27 On the impossibility of highly-efficient blockcipher-based hash functions – John Black, Martin Cochran, Thomas Shrimpton - 2005
73 Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology – Ueli Maurer, Renato Renner, Clemens Holenstein - 2004
72 Hash functions based on block ciphers: A synthetic approach – B Preneel, R Govaerts, J Vandewalle - 1994
24 Provably secure double-block-length hash functions in a black-box model – S Hirose - 2005
36 Some Plausible Constructions of Double-Block-Length Hash Functions – Shoichi Hirose - 2006
15 The collision intractability of MDC-2 in the ideal-cipher model – J P Steinberger - 2008
59 Multi-Property-Preserving Hash Domain Extension and the EMD Transform – Mihir Bellare, Thomas Ristenpart - 2006
13 Beyond uniformity: Better security/efficiency tradeoffs for compression functions – M Stam - 2008
76 Merkle-Damg˚ard Revisited: How to Construct a Hash Function – Jean-sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya
20 Salvaging Merkle-Damg˚ard for Practical Applications – Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton - 2009
175 One way hash functions and DES – R Merkle - 1990
289 A design principle for hash functions – Ivan Damg˚ard - 1989
1341 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
39 The Whirlpool hashing function – P Barreto, V Rijmen - 2000
3 Security/efficiency tradeoffs for permuation-based hashing – P Rogaway, J P Steinberger - 2008
3 Building a collision-resistant function from non-compressing primitives – T Shrimpton, M Stam - 2008