Blockcipher Based Hashing Revisited (2009)

Cached

Download Links

by Martijn Stam
Venue:Fast Software Encryption – FSE ’09
Citations:3 - 0 self

Documents Related by Co-Citation

71 Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology – Ueli Maurer, Renato Renner, Clemens Holenstein - 2004
18 Constructing cryptographic hash functions from fixed-key blockciphers. Full version of this paper – Phillip Rogaway, John Steinberger - 2008
175 One way hash functions and DES – R Merkle - 1990
59 Multi-Property-Preserving Hash Domain Extension and the EMD Transform – Mihir Bellare, Thomas Ristenpart - 2006
1 More on the pseudorandomness of Shabal’s permutation – J-P Aumasson, A Mashatan, W Meier - 2009
2 On the pseudorandomness of Shabal’s keyed permutation – Jean-Philippe Aumasson - 2009
10 M.: Shabal, a submission to NIST’s cryptographic hash algorithm competition (Oct 2008), available at http://www.shabal.com/?page_ id=38 – E Bresson, A Canteaut, B Chevallier-Mames, C Clavier, T Fuhr, A Gouget, T Icart, J F Misarsky, M Naya-Plasencia, P Paillier, T Pornin, J R Reinhard, C Thuillet, Videau
1 Some plausible constructions of double length hash functions – S Hirose - 2006
1 Herding hash functions and the Nostradmus attack – J Kelsey, T Kohno - 2006
1 Another glance at double length hashing, preprint – O Özen, M Stam - 2009
1 Beyond uniformity: Security/efficiency tradeoffs for compression functions – M Stam - 2008
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
42 A failure-friendly design principle for hash functions – Stefan Lucks - 2005
13 Single-Key AIL-MACs from Any FIL-MAC – Ueli M Maurer, Johan Sjödin
8 A Collision-Resistant Rate-1 Double-Block-Length Hash Function – Stefan Lucks
7 A Design Principle for Hash Functions. CRYPTO – Ivan Damgård - 1989
20 Salvaging Merkle-Damg˚ard for Practical Applications – Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton - 2009
8 Message Authentication Codes from Unpredictable Block Ciphers – Yevgeniy Dodis, John Steinberger - 2009
3 A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier – Kan Yasuda - 2009