Merkle–Damgård revisited: How to construct a hash function (2005)

by Jean-Sébastien Coron , Yevgeniy Dodis , Cécile Malinaud , Prashant Puniya
Citations:74 - 8 self

Documents Related by Co-Citation

289 A Design Principle for Hash Functions – Ivan Damg˚ard - 1990
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
175 One way hash functions and DES – R Merkle - 1990
214 How to break MD5 and other hash functions – Xiaoyun Wang, Hongbo Yu - 2005
93 Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions – A Joux - 2004
59 Multi-Property-Preserving Hash Domain Extension and the EMD Transform – Mihir Bellare, Thomas Ristenpart - 2006
101 The security of triple encryption and a framework for code-based game-playing proofs – Mihir Bellare, Phillip Rogaway - 2006
103 Black-box analysis of the block-cipher-based hash-function constructions from pgv – John Black, Phillip Rogaway, Thomas Shrimpton - 2002
167 Finding collisions in the full SHA-1 – Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu - 2005
71 Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology – Ueli Maurer, Renato Renner, Clemens Holenstein - 2004
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
71 Hash functions based on block ciphers: A synthetic approach – Bart Preneel, René Govaerts, Joos Vandewalle - 1993
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
48 Assche, On the Indifferentiability of the Sponge Construction – Guido Bertoni, Joan Daemen, Michael Peeters, Gilles Van - 2008
42 A failure-friendly design principle for hash functions – Stefan Lucks - 2005
13 M.: Indifferentiable security analysis of popular hash functions with prefix-free padding – Donghoon Chang, Sangjin Lee, Mridul N, Moti Yung - 2006
243 The Random Oracle Methodology, Revisited – Ran Canetti, Oded Goldreich, Shai Halevi - 1998
7 On the Impossibility of Highly Efficient Blockcipher-Based Hash Functions – J. Black, M. Cochran, T. Shrimpton - 2004
23 Provably Secure Double-Block-Length Hash Functions in a BlackBox Model – Shoichi Hirose - 2004