메뉴 건너뛰기




Volumn 3506, Issue , 2005, Pages 330-342

Provably secure double-block-length hash functions in a black-box model

Author keywords

Black box model; Block cipher; Double block length hash function

Indexed keywords

ALGORITHMS; BLOCK CODES; COMPUTATIONAL COMPLEXITY; FUNCTIONS; MATHEMATICAL MODELS;

EID: 24944500380     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11496618_24     Document Type: Conference Paper
Times cited : (54)

References (19)
  • 2
    • 24944585801 scopus 로고    scopus 로고
    • On the impossibility of highly efficient blockcipher-based hash functions
    • J. Black, M. Cochran, and T. Shrimpton. On the impossibility of highly efficient blockcipher-based hash functions. Cryptology ePrint Archive, Report 2004/062, 2004. http://eprint.iacr.org/.
    • (2004) Cryptology EPrint Archive, Report , vol.2004 , Issue.62
    • Black, J.1    Cochran, M.2    Shrimpton, T.3
  • 3
    • 50449107349 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher-based hash-function constructions from PGV
    • Lecture Notes in Computer Science 2442
    • J. Black, P. Rogaway, and T. Shrimpton. Black-box analysis of the block-cipher-based hash-function constructions from PGV. In CRYPTO 2002 Proceedings, pages 320-335, 2002. Lecture Notes in Computer Science 2442.
    • (2002) CRYPTO 2002 Proceedings , pp. 320-335
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 4
    • 24944587416 scopus 로고
    • Data authentication using modification detection codes based on a public one-way encryption function, mar. U. S. Patent # 4,908,861
    • B. O. Brachtl, D. Coppersmith, M. M. Hyden, S. M. Matyas Jr., C. H. W. Meyer, J. Oseas, S. Pilpel, and M. Schilling. Data authentication using modification detection codes based on a public one-way encryption function, mar 1990. U. S. Patent # 4,908,861.
    • (1990)
    • Brachtl, B.O.1    Coppersmith, D.2    Hyden, M.M.3    Matyas Jr., S.M.4    Meyer, C.H.W.5    Oseas, J.6    Pilpel, S.7    Schilling, M.8
  • 5
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Lecture Notes in Computer Science 435
    • I. Damgård. A design principle for hash functions. In CRYPTO'89 Proceedings, pages 416-427, 1990. Lecture Notes in Computer Science 435.
    • (1990) CRYPTO'89 Proceedings , pp. 416-427
    • Damgård, I.1
  • 7
    • 84957799016 scopus 로고
    • Security of iterated hash functions based on block ciphers
    • Lecture Notes in Computer Science 773
    • W. Hohl, X. Lai, T. Meier, and C. Waldvogel. Security of iterated hash functions based on block ciphers. In CRYPTO'93 Proceedings, pages 379-390, 1994. Lecture Notes in Computer Science 773.
    • (1994) CRYPTO'93 Proceedings , pp. 379-390
    • Hohl, W.1    Lai, X.2    Meier, T.3    Waldvogel, C.4
  • 8
    • 84941161050 scopus 로고    scopus 로고
    • Hash functions based on block ciphers and quaternary codes
    • Lecture Notes in Computer Science 1163
    • L. Knudsen and B. Preneel. Hash functions based on block ciphers and quaternary codes. In ASIACRYPT'96 Proceedings, pages 77-90, 1996. Lecture Notes in Computer Science 1163.
    • (1996) ASIACRYPT'96 Proceedings , pp. 77-90
    • Knudsen, L.1    Preneel, B.2
  • 9
    • 84958591161 scopus 로고    scopus 로고
    • Fast and secure hashing based on codes
    • Lecture Notes in Computer Science 1294
    • L. Knudsen and B. Preneel. Fast and secure hashing based on codes. In CRYPTO'97 Proceedings, pages 485-498, 1997. Lecture Notes in Computer Science 1294.
    • (1997) CRYPTO'97 Proceedings , pp. 485-498
    • Knudsen, L.1    Preneel, B.2
  • 10
    • 0036714381 scopus 로고    scopus 로고
    • Construction of secure and fast hash functions using nonbinary error-correcting codes
    • L. Knudsen and B. Preneel. Construction of secure and fast hash functions using nonbinary error-correcting codes. IEEE Transactions on Information Theory, 48(9):2524-2539, 2002.
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.9 , pp. 2524-2539
    • Knudsen, L.1    Preneel, B.2
  • 11
    • 0001769898 scopus 로고    scopus 로고
    • Attacks on fast double block length hash functions
    • L. R. Knudsen, X. Lai, and B. Preneel. Attacks on fast double block length hash functions. Journal of Cryptology, 11(1):59-72, 1998.
    • (1998) Journal of Cryptology , vol.11 , Issue.1 , pp. 59-72
    • Knudsen, L.R.1    Lai, X.2    Preneel, B.3
  • 12
    • 84985820553 scopus 로고
    • Hash function based on block ciphers
    • Lecture Notes in Computer Science 658
    • X. Lai and J. L. Massey. Hash function based on block ciphers. In EUROCRYPT'92 Proceedings, pages 55-70, 1993. Lecture Notes in Computer Science 658.
    • (1993) EUROCRYPT'92 Proceedings , pp. 55-70
    • Lai, X.1    Massey, J.L.2
  • 13
    • 84937407660 scopus 로고    scopus 로고
    • Tweakable block ciphers
    • Lecture Notes in Computer Science 2442
    • M. Liskov, R. L. Rivest, and D. Wagner. Tweakable block ciphers. In CRYPTO 2002 Proceedings, pages 31-46, 2002. Lecture Notes in Computer Science 2442.
    • (2002) CRYPTO 2002 Proceedings , pp. 31-46
    • Liskov, M.1    Rivest, R.L.2    Wagner, D.3
  • 15
    • 84937461306 scopus 로고
    • One way hash functions and des
    • Lecture Notes in Computer Science 435
    • R. C. Merkle. One way hash functions and DES. In CRYPTO'89 Proceedings, pages 428-446, 1990. Lecture Notes in Computer Science 435.
    • (1990) CRYPTO'89 Proceedings , pp. 428-446
    • Merkle, R.C.1
  • 16
    • 85026897539 scopus 로고
    • Hash functions based on block ciphers: A synthetic approach
    • Lecture Notes in Computer Science 773
    • B. Preneel, R. Govaerts, and J. Vandewalle. Hash functions based on block ciphers: A synthetic approach. In CRYPTO'95 Proceedings, pages 368-378, 1994. Lecture Notes in Computer Science 773.
    • (1994) CRYPTO'95 Proceedings , pp. 368-378
    • Preneel, B.1    Govaerts, R.2    Vandewalle, J.3
  • 18
    • 24744470329 scopus 로고    scopus 로고
    • Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD
    • X. Wang, D. Feng, X. Lai, and H. Yu. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology ePrint Archive, Report 2004/199, 2004. http://sprint.iacr.org/.
    • (2004) Cryptology EPrint Archive, Report , vol.2004 , Issue.199
    • Wang, X.1    Feng, D.2    Lai, X.3    Yu, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.