Hash Functions Based on Block Ciphers (1993)

by Xuejia Lai , James L. Massey
Venue:Proc. of EUROCRYPT 92
Citations:53 - 7 self

Documents Related by Co-Citation

175 One way hash functions and DES – R Merkle - 1990
289 A design principle for hash functions – I Damg˚ard - 1990
103 Black-box analysis of the block-cipher-based hash-function constructions from pgv – John Black, Phillip Rogaway, Thomas Shrimpton - 2002
71 Hash functions based on block ciphers: A synthetic approach – B Preneel, R Govaerts, J Vandewalle - 1994
35 Some Plausible Constructions of Double-Block-Length Hash Functions – Shoichi Hirose - 2006
23 Provably Secure Double-Block-Length Hash Functions in a BlackBox Model – Shoichi Hirose - 2004
74 Merkle-Damg˚ard Revisited: How to Construct a Hash Function – Jean-sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya
46 Formal Aspects of Mobile Code Security – R D Dean - 1999
56 LOKI: A Cryptographic Primitive for Authentication and Secrecy Applications – L Brown, J Pieprzyk, J Seberry - 1990
18 Constructing cryptographic hash functions from fixed-key blockciphers. Full version of this paper – Phillip Rogaway, John Steinberger - 2008
21 Attacks on fast double block length hash functions – L R Knudsen, X J Lai, B Preneel - 1998
42 A failure-friendly design principle for hash functions – Stefan Lucks - 2005
93 Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions – A Joux - 2004
22 Data Authentication Using Modification Detection Codes Based on a Public One Way Encryption Function”,1990, U.S. Patent Number 4,908,861 – B O Brachtl, D Coppersmith, M M Hyden, S M Matyas, C H Meyer, J Oseas, S Pilpel, M Schilling
13 The collision intractability of mdc-2 in the ideal-cipher model – J P Steinberger - 2007
167 Finding collisions in the full SHA-1 – Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu - 2005
213 How to break MD5 and other hash functions – Xiaoyun Wang, Hongbo Yu - 2005
8 Collision-free Hashfunctions Based on Blockcipher Algorithmsl – Bart Preneel, Antoon Bosselaers, Rene Govaerts, Joos Vandewalle - 1989
12 Secure program load with manipulation detection code – C H Meyer, M Schilling - 1998