An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions (2009)

Cached

Download Links

by Mohammad Reza Reyhanitabar , Willy Susilo , Yi Mu
Venue:CRYPTOLOGY EPRINT ARCHIVE, REPORT 2009/506
Citations:1 - 1 self

Active Bibliography

Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
2 Construction of UOWHF: Tree Hashing Revisited – Palash Sarkar - 2002
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions – Charles Bouillaguet, Orr Dunkelman, Pierre-alain Fouque, Antoine Joux
New Second Preimage Attacks on Hash Functions ⋆ – Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sebastien Zimmer
9 Amplifying Collision Resistance: A Complexity-Theoretic Treatment – Ran Canetti, Madhu Sudan, Luca Trevisan, Salil Vadhan, Hoeteck Wee
2 Higher Order Universal One-Way Hash Functions – Deukjo Hong, Bart Preneel, Sangjin Lee - 2004
2 Y.: Enhanced Security Notions for DedicatedKey Hash Functions: Definitions and Relationships – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2005
A Sufficient Condition and an Optimal Domain Extension of UOWHF – Mridul Nandi - 2004
6 New Results on NMAC/HMAC when Instantiated with Popular Hash Functions – Christian Rechberger, Vincent Rijmen - 2008
3 A critical look at cryptographic hash function literature – Scott Contini, Ron Steinfeld, Josef Pieprzyk, Krystian Matusiewicz - 2007
structures to cryptography – unknown authors - 2009
10 A Parallelizable Design Principle for Cryptography Hash Functions – Palash Sarkar, Paul J. Schellenberg - 2001
6 Domain Extenders for UOWHF: A Generic Lower Bound on Key Expansion And Finite Binary Tree Algorithm – Palash Sarkar - 2003
3 New Parallel Domain Extenders for UOWHF – Wonil Lee, Donghoon Chang, Sangjin Lee, Soohak Sung, Mridul Nandi
2 A Three-Property-Secure Hash Function – Elena Andreeva, Bart Preneel
2 Hash Functions from Sigma Protocols and Improvements to VSH – Mihir Bellare, Todor Ristov - 2008
16 Hash Functions: From Merkle-Damgård to Shoup – Ilya Mironov - 2001