Constructing cryptographic hash functions from fixed-key blockciphers. Full version of this paper (2008)

by Phillip Rogaway , John Steinberger
Citations:18 - 5 self

Active Bibliography

Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
Efficient Hashing using the AES Instruction Set – Onur Özen, Martijn Stam
3 Blockcipher Based Hashing Revisited – Martijn Stam - 2009
15 Building a collision-resistant compression function from non-compressing primitives – Thomas Shrimpton, Martijn Stam - 2008
1 Security of Single-permutation-based Compression Functions – Jooyoung Lee, Daesung Kwon
Security Analysis and Comparison of the SHA-3 Finalists – Elena Andreeva, Bart Mennink, Bart Preneel, Marjan ˇ Skrobot
6 The security of abreast-dm in the ideal cipher model – Jooyoung Lee, Daesung Kwon
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008
4 Adaptive Preimage Resistance and Permutation-based Hash Functions. Available at http://eprint.iacr.org/2009/066 – Jooyoung Lee, Je Hong Park
5 A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions – Zheng Gong, Xuejia Lai, Kefei Chen - 2007
5 A new mode of operation for block ciphers and length-preserving MACs – Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya - 2008
On the Design of Secure and Fast Double Block Length Hash Functions – Zheng Gong, Xuejia Lai, Kefei Chen
A unified indifferentiability proof for . . . – Anne Canteaut, Thomas Fuhr, et al.
6 On the Security of Tandem-DM – Ewan Fleischmann, Michael Gorski, Stefan Lucks
13 M.: Indifferentiable security analysis of popular hash functions with prefix-free padding – Donghoon Chang, Sangjin Lee, Mridul N, Moti Yung - 2006
Towards Understanding the Known-Key Security of Block Ciphers – Elena Andreeva, Andrey Bogdanov, Bart Mennink
1 Indifferentiability of Single-Block-Length and Rate-1 Compression Functions – Hidenori Kuwakado, Masakatu Morii - 2006
20 Salvaging Merkle-Damg˚ard for Practical Applications – Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton - 2009
8 A Collision-Resistant Rate-1 Double-Block-Length Hash Function – Stefan Lucks