How to Build a Hash Function from any Collision-Resistant Function (2007)

by Thomas Ristenpart , Thomas Shrimpton
Citations:12 - 3 self

Active Bibliography

5 A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions – Zheng Gong, Xuejia Lai, Kefei Chen - 2007
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
11 How Risky is the Random-Oracle Model? – Gaëtan Leurent, Phong Q. Nguyen
Security Analysis and Comparison of the SHA-3 Finalists – Elena Andreeva, Bart Mennink, Bart Preneel, Marjan ˇ Skrobot
3 Blockcipher Based Hashing Revisited – Martijn Stam - 2009
2 A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical – Anja Lehmann, Stefano Tessaro - 2009
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions – Charles Bouillaguet, Orr Dunkelman, Pierre-alain Fouque, Antoine Joux
15 Building a collision-resistant compression function from non-compressing primitives – Thomas Shrimpton, Martijn Stam - 2008
Black-box property of Cryptographic Hash Functions ⋆ – unknown authors
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
20 Salvaging Merkle-Damg˚ard for Practical Applications – Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton - 2009
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
On the Design of Secure and Fast Double Block Length Hash Functions – Zheng Gong, Xuejia Lai, Kefei Chen
1 Indifferentiability of Single-Block-Length and Rate-1 Compression Functions – Hidenori Kuwakado, Masakatu Morii - 2006
19 Constructing cryptographic hash functions from fixed-key blockciphers. Full version of this paper – Phillip Rogaway, John Steinberger - 2008
1 Y.: An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions. Cryptology ePrint Archive, Report 2009/506 – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2009
Efficient Hashing using the AES Instruction Set – Onur Özen, Martijn Stam
59 Multi-Property-Preserving Hash Domain Extension and the EMD Transform – Mihir Bellare, Thomas Ristenpart - 2006
Prashant PuniyaThe Random Oracle Methodology – Jean-sebastien Coron, Yevgeniy Dodis, Cecile Malinaud