Merkle–Damgård revisited: How to construct a hash function (2005)

by Jean-Sébastien Coron , Yevgeniy Dodis , Cécile Malinaud , Prashant Puniya
Citations:74 - 8 self

Active Bibliography

Prashant PuniyaThe Random Oracle Methodology – Jean-sebastien Coron, Yevgeniy Dodis, Cecile Malinaud
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
5 A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions – Zheng Gong, Xuejia Lai, Kefei Chen - 2007
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
11 How Risky is the Random-Oracle Model? – Gaëtan Leurent, Phong Q. Nguyen
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions – Charles Bouillaguet, Orr Dunkelman, Pierre-alain Fouque, Antoine Joux
Security of Practical Cryptosystems Using Merkle-Damg˚ard Hash Function in the Ideal Cipher Model – Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta, Mitsubishi Electoric Corporation
Instantiating Random Oracles via UCEs – Mihir Bellare, Viet Tung, Hoang Sriram Keelveedhi - 2013
59 Multi-Property-Preserving Hash Domain Extension and the EMD Transform – Mihir Bellare, Thomas Ristenpart - 2006
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
5 A new mode of operation for block ciphers and length-preserving MACs – Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya - 2008
2 S.: Some observations on indifferentiability – Ewan Fleischmann, Michael Gorski, Stefan Lucks - 2010
2 New Integrated proof method on Iterated Hash Structure and New Structures – Duo Lei - 2006
20 Salvaging Merkle-Damg˚ard for Practical Applications – Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton - 2009
2 Y.: Enhanced Security Notions for DedicatedKey Hash Functions: Definitions and Relationships – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2005
3 The MD6 hash function A proposal to NIST for SHA-3 – Ronald L. Rivest, Benjamin Agre, Daniel V. Bailey, Christopher Crutchfield, Yevgeniy Dodis, Kermin Elliott, Fleming Asif Khan, Jayant Krishnamurthy, Yuncheng Lin, Leo Reyzin, Emily Shen, Jim Sukha, Drew Sutherland, Eran Tromer, Yiqun Lisa Yin - 2008
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
11 How to Build a Hash Function from any Collision-Resistant Function – Thomas Ristenpart, Thomas Shrimpton - 2007
On the Indifferentiability of the Integrated-Key Hash Functions – Saif Al-kuwari