Hash functions in the dedicated-key setting: Design choices and MPP transforms (2007)

by Mihir Bellare , Thomas Ristenpart
Venue:34th International Colloquium on Automata, Languages and Programming – ICALP 2007, volume 4596 of Lecture Notes in Computer Science
Citations:13 - 1 self

Active Bibliography

59 Multi-Property-Preserving Hash Domain Extension and the EMD Transform – Mihir Bellare, Thomas Ristenpart - 2006
3 A critical look at cryptographic hash function literature – Scott Contini, Ron Steinfeld, Josef Pieprzyk, Krystian Matusiewicz - 2007
On the Security of Iterated Hashing based on Forgery-resistant Compression Functions – Charles Bouillaguet, Orr Dunkelman, Pierre-alain Fouque, Antoine Joux
11 How to Build a Hash Function from any Collision-Resistant Function – Thomas Ristenpart, Thomas Shrimpton - 2007
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
1 Y.: An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions. Cryptology ePrint Archive, Report 2009/506 – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2009
The Skein Hask Function Family – Niels Ferguson, Stefan Lucks, Bruce Schneier, Doug Whiting, Mihir Bellare, Tadayoshi Kohno, Jon Callas, Jesse Walker - 2009
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
Black-box property of Cryptographic Hash Functions ⋆ – unknown authors
Prashant PuniyaThe Random Oracle Methodology – Jean-sebastien Coron, Yevgeniy Dodis, Cecile Malinaud
Provable Security Support . . . – Mihir Bellare, Tadayoshi Kohno, Stefan Lucks, Niels Ferguson, Bruce Schneier, Doug Whiting, Jon Callas, Jesse Walker - 2009
5 Provable Security Support for the Skein Hash Family – Mihir Bellare, et al. - 2009
Cryptographic Hash Functions: A Review – Rajeev Sobti, G. Geetha
An Update on the Analysis and Design of NMAC and HMAC Functions – Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai - 2006
5 A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions – Zheng Gong, Xuejia Lai, Kefei Chen - 2007
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension – Donghoon Chang, Seokhie Hong, Jaechul Sung, Sangjin Lee
Instantiating Random Oracles via UCEs – Mihir Bellare, Viet Tung, Hoang Sriram Keelveedhi - 2013
Security Analysis and Comparison of the SHA-3 Finalists – Elena Andreeva, Bart Mennink, Bart Preneel, Marjan ˇ Skrobot
11 How Risky is the Random-Oracle Model? – Gaëtan Leurent, Phong Q. Nguyen