On the impossibility of highly-efficient blockcipher-based hash functions (2005)

by J. Black , M. Cochran , T. Shrimpton
Citations:27 - 3 self

Active Bibliography

7 On the Impossibility of Highly Efficient Blockcipher-Based Hash Functions – J. Black, M. Cochran, T. Shrimpton - 2004
15 Building a collision-resistant compression function from non-compressing primitives – Thomas Shrimpton, Martijn Stam - 2008
10 Towards Secure and Fast Hash Functions – Takashi Satoh, Mio Haga, Kaoru Kurosawa - 1999
13 M.: Indifferentiable security analysis of popular hash functions with prefix-free padding – Donghoon Chang, Sangjin Lee, Mridul N, Moti Yung - 2006
3 Blockcipher Based Hashing Revisited – Martijn Stam - 2009
19 Constructing cryptographic hash functions from fixed-key blockciphers. Full version of this paper – Phillip Rogaway, John Steinberger - 2008
Efficient Hashing using the AES Instruction Set – Onur Özen, Martijn Stam
15 On the impossibility of efficiently combining collision resistant hash functions – Dan Boneh, Xavier Boyen - 2006
4 Cryptanalysis of Block Ciphers Based on SHA-1 and MD5 – Markku-Juhani O. Saarinen - 2003
1 On High-Rate Cryptographic Compression Functions – Richard Ostertág, Martin Stanek - 2005
1 Tweakable Blockciphers with Beyond Birthday-Bound Security – Will L, Thomas Shrimpton, R. Seth Terashima
6 On the Security of Tandem-DM – Ewan Fleischmann, Michael Gorski, Stefan Lucks
15 Second preimages on n-bit hash functions for much less than 2^n work – John Kelsey, Bruce Schneier
On the (In)Security of IDEA in Various Hashing Modes ⋆ – Lei Wei, Thomas Peyrin, San Ling, Josef Pieprzyk, Huaxiong Wang
1 Security of Single-permutation-based Compression Functions – Jooyoung Lee, Daesung Kwon
Security of Permutation-based Compression Function lp231 – Jooyoung Lee, Daesung Kwon
22 Formalizing human ignorance: Collision-resistant hashing without the keys – Phillip Rogaway - 2006
Prashant PuniyaThe Random Oracle Methodology – Jean-sebastien Coron, Yevgeniy Dodis, Cecile Malinaud
76 Merkle-Damg˚ard Revisited: How to Construct a Hash Function – Jean-sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya