메뉴 건너뛰기




Volumn 3557, Issue , 2005, Pages 243-254

Security analysis of a 2/3-rate double length compression function in the black-box model

Author keywords

[No Author keywords available]

Indexed keywords

MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 26444539878     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11502760_16     Document Type: Conference Paper
Times cited : (29)

References (21)
  • 1
    • 50449107349 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher-based hash function constructions from PGV
    • Advances in Cryptology - Crypto'02, Springer-Verlag
    • J. Black, P. Rogaway, and T. Shrimpton. Black-box analysis of the block-cipher-based hash function constructions from PGV, Advances in Cryptology - Crypto'02, Lecture Notes in Computer Science, Vol. 2442, Springer-Verlag, pp. 320-335, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 320-335
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 2
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Advances in Cryptology - Crypto'89, Springer-Verlag
    • I. B. Damgard. A design principle for hash functions, Advances in Cryptology - Crypto'89, Lecture Notes in Computer Sciences, Vol. 435, Springer-Verlag, pp. 416-427, 1989.
    • (1989) Lecture Notes in Computer Sciences , vol.435 , pp. 416-427
    • Damgard, I.B.1
  • 3
    • 84958953847 scopus 로고    scopus 로고
    • Cryptanalysis of MD4
    • Fast Software Encryption, Cambridge Workshop, D. Gollman ed. Springer-Verlag
    • H. Dobbertin. Cryptanalysis of MD4- Fast Software Encryption, Cambridge Workshop. Lecture Notes in Computer Science, vol 1039, D. Gollman ed. Springer-Verlag 1996.
    • (1996) Lecture Notes in Computer Science , vol.1039
    • Dobbertin, H.1
  • 5
    • 84958957924 scopus 로고    scopus 로고
    • RIPEMD-160: A strengthened version of RIPEMD
    • Fast Software Encryption, D. Gollmann, ed., Springer-Verlag
    • H. Dobbertin, A. Bosselaers and B. Preneel. RIPEMD-160: A strengthened version of RIPEMD, Fast Software Encryption. Lecture Notes in Computer Science 1039, D. Gollmann, ed., Springer-Verlag, 1996.
    • (1996) Lecture Notes in Computer Science , vol.1039
    • Dobbertin, H.1    Bosselaers, A.2    Preneel, B.3
  • 6
    • 26444546724 scopus 로고    scopus 로고
    • More problems with hash functions
    • 24 Aug
    • H. Finney. More problems with hash functions. The cryptographic mailing list. 24 Aug 2004. http://lists.virus.org/cryptography-0408/msg00124.html.
    • (2004) The Cryptographic Mailing List
    • Finney, H.1
  • 7
    • 33847615890 scopus 로고    scopus 로고
    • Analysis of double block lengh hash functions
    • Cryptographi and Coding 2003
    • M. Hattori, S. Hirose and S. Yoshida. Analysis of Double Block Lengh Hash Functions. Cryptographi and Coding 2003, LNCS 2898.
    • LNCS , vol.2898
    • Hattori, M.1    Hirose, S.2    Yoshida, S.3
  • 8
    • 26444518104 scopus 로고    scopus 로고
    • Provably secure double-block-length hash functions in a black-box model
    • to appear in
    • S. Hirose. Provably Secure Double-Block-Length Hash Functions in a Black-Box Model, to appear in ICISC-04.
    • ICISC-04
    • Hirose, S.1
  • 9
    • 33645780237 scopus 로고    scopus 로고
    • Multicollision on iterated hash function
    • Advances in Cryptology, CRYPTO 2004
    • A. Joux. Multicollision on Iterated Hash Function. Advances in Cryptology, CRYPTO 2004, Lecture Notes in Computer Science 3152.
    • Lecture Notes in Computer Science , vol.3152
    • Joux, A.1
  • 11
    • 0001769898 scopus 로고    scopus 로고
    • Attacks on fast double block length hash functions
    • winter
    • L. Knudsen, X. Lai and B. Preneel. Attacks on fast double block length hash functions. J. Cryptology, vol 11 no 1, winter 1998.
    • (1998) J. Cryptology , vol.11 , Issue.1
    • Knudsen, L.1    Lai, X.2    Preneel, B.3
  • 12
    • 0036714381 scopus 로고    scopus 로고
    • Construction of secure and fast hash functions using nonbinary error-correcting codes
    • Sept
    • L. Knudsen and B. Preneel. Construction of Secure and Fast Hash Functions Using Nonbinary Error-Correcting Codes. IEEE transactions on information theory, VOL-48, NO. 9, Sept-2002.
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.9
    • Knudsen, L.1    Preneel, B.2
  • 15
    • 84937461306 scopus 로고
    • One way hash functions and des
    • Advances in Cryptology - Crypto'89, Springer-Verlag
    • R. Merkle. One way hash functions and DES, Advances in Cryptology - Crypto'89, Lecture Notes in Computer Sciences, Vol. 435, Springer-Verlag, pp. 428-446, 1989.
    • (1989) Lecture Notes in Computer Sciences , vol.435 , pp. 428-446
    • Merkle, R.1
  • 17
    • 4043135942 scopus 로고    scopus 로고
    • August
    • NIST/NSA. FIPS 180-2 Secure Hash Standard, August, 2002. http://csrc.nist.gov/ publications/fips/fips180-2/fipsl80-2.pdf
    • (2002) FIPS 180-2 Secure Hash Standard
  • 18
    • 85026897539 scopus 로고
    • Hash functions based on block ciphers: A synthetic approach
    • Advances in Cryptology-CRYPTO'93, Springer-Verlag
    • B. Preneel, R. Govaerts, and J. Vandewalle. Hash functions based on block ciphers:A synthetic approach, Advances in Cryptology-CRYPTO'93, LNCS, Springer-Verlag, pp. 368-378, 1994.
    • (1994) LNCS , pp. 368-378
    • Preneel, B.1    Govaerts, R.2    Vandewalle, J.3
  • 20
    • 0032682994 scopus 로고    scopus 로고
    • Towards secure and fast hash functions
    • January
    • T. Satoh, M. Haga and K. Kurosawa. Towards Secure and Fast Hash Functions. IEICE Trans. VOL. E82-A, NO. 1 January, 1999.
    • (1999) IEICE Trans. , vol.E82-A , Issue.1
    • Satoh, T.1    Haga, M.2    Kurosawa, K.3
  • 21
    • 26444583274 scopus 로고    scopus 로고
    • Cryptanalysis of MD5 and SHA
    • Sept
    • B. Schneier. Cryptanalysis of MD5 and SHA. Crypto-Gram Newsletter, Sept-2004. http://www. schneier.com/crypto-gram-0409.htm#3.
    • (2004) Crypto-gram Newsletter
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.