메뉴 건너뛰기




Volumn E88-A, Issue 1, 2005, Pages 39-48

PGV-style block-cipher-based hash families and black-box analysis

Author keywords

Black box model; Block cipher; Hash function; Provable security

Indexed keywords

MATHEMATICAL MODELS; PUBLIC KEY CRYPTOGRAPHY;

EID: 27544457324     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1093/ietfec/E88-A.1.39     Document Type: Conference Paper
Times cited : (3)

References (14)
  • 1
    • 50449107349 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher-based hash function constructions from PGV
    • Advances in Cryptology-Crypto'02, Springer-Verlag
    • J. Black, P. Rogaway, and T. Shrimpton, "Black-box analysis of the block-cipher-based hash function constructions from PGV," Advances in Cryptology-Crypto'02, Lecture Notes in Computer Science, vol.2442, pp.320-335, Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 320-335
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 2
    • 85026897539 scopus 로고
    • Hash functions based on block ciphers: A synthetic approach
    • LNCS, Springer-Verlag
    • B. Preneel, R. Govaerts, and J. Vandewalle, "Hash functions based on block ciphers: A synthetic approach," Advances in Cryptology-CRYPTO'93, LNCS, pp.368-378, Springer-Verlag, 1994.
    • (1994) Advances in Cryptology-CRYPTO'93 , pp. 368-378
    • Preneel, B.1    Govaerts, R.2    Vandewalle, J.3
  • 3
    • 85029454400 scopus 로고
    • A construction of a cipher from a single pseudorandom permutation
    • Advances in Cryptology-ASIACRYPT'91, Springer-Verlag
    • S. Even and Y. Mansour, "A construction of a cipher from a single pseudorandom permutation," Advances in Cryptology-ASIACRYPT'91, LNCS 739, pp.210-224, Springer-Verlag, 1992.
    • (1992) LNCS , vol.739 , pp. 210-224
    • Even, S.1    Mansour, Y.2
  • 4
    • 0037614498 scopus 로고    scopus 로고
    • How to protect DES against exhaustive key search
    • Earlier version in CRYPTO' 96
    • J. Kilian and P. Rogaway, "How to protect DES against exhaustive key search," J. Cryptology, vol.14, no.1, pp. 17-35, 2001. Earlier version in CRYPTO' 96.
    • (2001) J. Cryptology , vol.14 , Issue.1 , pp. 17-35
    • Kilian, J.1    Rogaway, P.2
  • 6
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol.28, no.4, pp.656-715, 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.1
  • 7
    • 84958663551 scopus 로고    scopus 로고
    • Collision-resistant hashing: Towards making UOWHFs practical
    • Advances in Cryptology-Crypto'97, Springer-Verlag
    • M. Bellare and P. Rogaway, "Collision-resistant hashing: Towards making UOWHFs practical," Advances in Cryptology-Crypto'97, Lecture Notes in Computer Science, vol.1294, pp.470-484, Springer-Verlag, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 470-484
    • Bellare, M.1    Rogaway, P.2
  • 8
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Advances in Cryptology - Crypto'89, Springer-Verlag
    • I.B. Damgard, "A design principle for hash functions," Advances in Cryptology - Crypto'89, Lecture Notes in Computer Sciences, vol.435, pp.416-427, Springer-Verlag, 1989.
    • (1989) Lecture Notes in Computer Sciences , vol.435 , pp. 416-427
    • Damgard, I.B.1
  • 9
    • 84937461306 scopus 로고
    • One way hash functions and DES
    • Advances in Cryptology - Crypto'89, Springer-Verlag
    • R. Merkle, "One way hash functions and DES," Advances in Cryptology - Crypto'89, Lecture Notes in Computer Sciences, vol.435, pp.428-446, Springer-Verlag, 1989.
    • (1989) Lecture Notes in Computer Sciences , vol.435 , pp. 428-446
    • Merkle, R.1
  • 10
    • 84945124866 scopus 로고    scopus 로고
    • Hash functions: From Merkle-Damgard to shoup
    • Advances in Cryptology - Eurocrypt'01, Springer-Verlag
    • I. Mironov, "Hash functions: From Merkle-Damgard to shoup," Advances in Cryptology - Eurocrypt'01, Lecture Notes in Computer Science, vol.2045, pp.166-181, Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 166-181
    • Mironov, I.1
  • 12
    • 29144504764 scopus 로고    scopus 로고
    • Construction of UOWHF: Tree Hashing Revisited
    • P. Sarkar, "Construction of UOWHF: Tree Hashing Revisited," Cryptology ePrint Archive, http://eprint.iacr.org/2002/058.
    • Cryptology ePrint Archive
    • Sarkar, P.1
  • 13
    • 84948968075 scopus 로고    scopus 로고
    • A composition theorem for universal one-way hash functions
    • Advances in Cryptology-Eurocrypt'00, Springer-Verlag
    • V. Shoup, "A composition theorem for universal one-way hash functions," Advances in Cryptology-Eurocrypt'00, Lecture Notes in Computer Science, vol.1807, pp.445-452, Springer-Verlag, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 445-452
    • Shoup, V.1
  • 14
    • 84957690790 scopus 로고    scopus 로고
    • Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
    • Advances in Cryptology - Eurocrypt'98, Springer-Verlag
    • D. Simon, "Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?," Advances in Cryptology - Eurocrypt'98, Lecture Notes in Computer Science, vol. 1403, pp.334-345, Springer-Verlag, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1403 , pp. 334-345
    • Simon, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.