Blockcipher Based Hashing Revisited (2009)


Download Links

by Martijn Stam
Venue:Fast Software Encryption – FSE ’09
Citations:3 - 0 self

Active Bibliography

Security Analysis and Comparison of the SHA-3 Finalists – Elena Andreeva, Bart Mennink, Bart Preneel, Marjan ˇ Skrobot
18 Constructing cryptographic hash functions from fixed-key blockciphers. Full version of this paper – Phillip Rogaway, John Steinberger - 2008
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
Efficient Hashing using the AES Instruction Set – Onur Özen, Martijn Stam
15 Building a collision-resistant compression function from non-compressing primitives – Thomas Shrimpton, Martijn Stam - 2008
A unified indifferentiability proof for . . . – Anne Canteaut, Thomas Fuhr, et al.
13 M.: Indifferentiable security analysis of popular hash functions with prefix-free padding – Donghoon Chang, Sangjin Lee, Mridul N, Moti Yung - 2006
On the Design of Secure and Fast Double Block Length Hash Functions – Zheng Gong, Xuejia Lai, Kefei Chen
1 Security of Single-permutation-based Compression Functions – Jooyoung Lee, Daesung Kwon
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions – Charles Bouillaguet, Orr Dunkelman, Pierre-alain Fouque, Antoine Joux
5 A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions – Zheng Gong, Xuejia Lai, Kefei Chen - 2007
11 How to Build a Hash Function from any Collision-Resistant Function – Thomas Ristenpart, Thomas Shrimpton - 2007
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008
Towards Understanding the Known-Key Security of Block Ciphers – Elena Andreeva, Andrey Bogdanov, Bart Mennink
Cryptographic Hash Functions: A Review – Rajeev Sobti, G. Geetha
3 Multi-property-preserving Domain Extension Using Polynomial-based Modes of Operation – Jooyoung Lee, John Steinberger
2 A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical – Anja Lehmann, Stefano Tessaro - 2009
Provable Security Support . . . – Mihir Bellare, Tadayoshi Kohno, Stefan Lucks, Niels Ferguson, Bruce Schneier, Doug Whiting, Jon Callas, Jesse Walker - 2009
5 Provable Security Support for the Skein Hash Family – Mihir Bellare, et al. - 2009