Constructing cryptographic hash functions from fixed-key blockciphers. Full version of this paper (2008)

by Phillip Rogaway , John Steinberger
Citations:21 - 5 self

Active Bibliography

Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
1 Efficient Hashing using the AES Instruction Set – Onur Özen, Martijn Stam
3 Blockcipher Based Hashing Revisited – Martijn Stam - 2009
16 Building a collision-resistant compression function from non-compressing primitives – Thomas Shrimpton, Martijn Stam - 2008
1 Security of Single-permutation-based Compression Functions – Jooyoung Lee, Daesung Kwon
Security of Permutation-based Compression Function lp231 – Jooyoung Lee, Daesung Kwon
1 Security Analysis and Comparison of the SHA-3 Finalists – Elena Andreeva, Bart Mennink, Bart Preneel, Marjan ˇ Skrobot
6 The security of abreast-dm in the ideal cipher model – Jooyoung Lee, Daesung Kwon
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008