Merkle–Damgård revisited: How to construct a hash function (2005)

by Jean-Sébastien Coron , Yevgeniy Dodis , Cécile Malinaud , Prashant Puniya
Citations:83 - 8 self

Active Bibliography

Prashant PuniyaThe Random Oracle Methodology – Jean-sebastien Coron, Yevgeniy Dodis, Cecile Malinaud
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
5 A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions – Zheng Gong, Xuejia Lai, Kefei Chen - 2007
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
11 How Risky is the Random-Oracle Model? – Gaëtan Leurent, Phong Q. Nguyen
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions – Charles Bouillaguet, Orr Dunkelman, Pierre-alain Fouque, Antoine Joux
Security of Practical Cryptosystems Using Merkle-Damg˚ard Hash Function in the Ideal Cipher Model – Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta, Mitsubishi Electoric Corporation
Instantiating Random Oracles via UCEs – Mihir Bellare, Viet Tung, Hoang Sriram Keelveedhi - 2013
59 Multi-Property-Preserving Hash Domain Extension and the EMD Transform – Mihir Bellare, Thomas Ristenpart - 2006
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
5 A new mode of operation for block ciphers and length-preserving MACs – Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya - 2008
2 S.: Some observations on indifferentiability – Ewan Fleischmann, Michael Gorski, Stefan Lucks - 2010
2 New Integrated proof method on Iterated Hash Structure and New Structures – Duo Lei - 2006
20 Salvaging Merkle-Damg˚ard for Practical Applications – Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton - 2009
2 Y.: Enhanced Security Notions for DedicatedKey Hash Functions: Definitions and Relationships – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2005
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
12 How to Build a Hash Function from any Collision-Resistant Function – Thomas Ristenpart, Thomas Shrimpton - 2007
On the Indifferentiability of the Integrated-Key Hash Functions – Saif Al-kuwari
Security Analysis and Comparison of the SHA-3 Finalists – Elena Andreeva, Bart Mennink, Bart Preneel, Marjan ˇ Skrobot