메뉴 건너뛰기




Volumn 3788 LNCS, Issue , 2005, Pages 474-494

A failure-friendly design principle for hash functions

Author keywords

Failure friendliness; Hash function; Multi collision; Provable security

Indexed keywords

DATA COMPRESSION; FUNCTIONS; ITERATIVE METHODS; MATHEMATICAL MODELS; SECURITY OF DATA;

EID: 33646776051     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11593447_26     Document Type: Conference Paper
Times cited : (127)

References (29)
  • 2
    • 50449107349 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher based hash-function construction from PGV
    • Crypto 02
    • J. Black, P. Rogaway, T. Shrimpton, Black-box analysis of the block-cipher based hash-function construction from PGV. Crypto 02, LNCS 2442, 320-335.
    • LNCS , vol.2442 , pp. 320-335
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 3
    • 84957808681 scopus 로고    scopus 로고
    • Design validation for discrete logarithm based signature schemes
    • PKC 2000
    • E. Brickell, D. Pointcheval, S. Vaudenay, M. Yung. Design validation for discrete logarithm based signature schemes. PKC 2000, LNCS 1751, 276-292
    • LNCS , vol.1751 , pp. 276-292
    • Brickell, E.1    Pointcheval, D.2    Vaudenay, S.3    Yung, M.4
  • 5
    • 33646778026 scopus 로고    scopus 로고
    • How to construct a hash function
    • Merkle-Damgård revisited; Accepted for
    • J. Coron, Y. Dodis, C. Malinaud, P. Punyia. Merkle-Damgård revisited; how to construct a hash function, Accepted for Crypto 2005.
    • Crypto 2005
    • Coron, J.1    Dodis, Y.2    Malinaud, C.3    Punyia, P.4
  • 6
    • 84981199109 scopus 로고    scopus 로고
    • A design principle for hash functions
    • Crypto 89
    • I. Damgård. A design principle for hash functions. Crypto 89, LNCS 435, 416-427.
    • LNCS , vol.435 , pp. 416-427
    • Damgård, I.1
  • 7
    • 84888819057 scopus 로고    scopus 로고
    • The story of Alice and her boss
    • rump session
    • M. Daum, S. Lucks. The story of Alice and her boss. Eurocrypt 05 rump session, http://th.informatik.uni-mannheim.de/people/lucks/HashCollisions/
    • Eurocrypt 05
    • Daum, M.1    Lucks, S.2
  • 8
    • 84958957924 scopus 로고    scopus 로고
    • RIPEMD-160, a strengthened version of RIPEMD
    • FSE 1996
    • H. Dobbertin, A. Bosselaers, B. Preneel, RIPEMD-160, a strengthened version of RIPEMD. FSE 1996, LNCS 1039, 71-82.
    • LNCS , vol.1039 , pp. 71-82
    • Dobbertin, H.1    Bosselaers, A.2    Preneel, B.3
  • 9
    • 33646801513 scopus 로고    scopus 로고
    • See also http://www.esat.kuleuven.ac.be/bosselae/ripemd160.html
  • 11
    • 84955562814 scopus 로고    scopus 로고
    • On the length of cryptographic hash-values used in identification schemes
    • Crypto 94
    • M. Girault, J. Stern. On the length of cryptographic hash-values used in identification schemes. Crypto 94, LNCS 839, 202-215
    • LNCS , vol.839 , pp. 202-215
    • Girault, M.1    Stern, J.2
  • 12
    • 33645780237 scopus 로고    scopus 로고
    • Multicollisions in iterated hash functions, application to cascaded constructions
    • Crypto 04
    • A. Joux. Multicollisions in iterated hash functions, application to cascaded constructions. Crypto 04, LNCS 3152, 306-316.
    • LNCS , vol.3152 , pp. 306-316
    • Joux, A.1
  • 15
    • 33646803364 scopus 로고    scopus 로고
    • On the possibility of constructing meaningful hash collisions for public keys
    • To appear
    • A. Lenstra, B. de Weger. On the possibility of constructing meaningful hash collisions for public keys, To appear at ACISP 2005.
    • ACISP 2005
    • Lenstra, A.1    De Weger, B.2
  • 17
    • 84937461306 scopus 로고    scopus 로고
    • One-way hash functions and des
    • Crypto 89
    • R. Merkle. One-way hash functions and DES. Crypto 89, LNCS 435, 428-446.
    • LNCS , vol.435 , pp. 428-446
    • Merkle, R.1
  • 18
    • 85018212721 scopus 로고    scopus 로고
    • Practical attacks on digital signatures using MD5 message digest
    • O. Mikle. Practical attacks on digital signatures using MD5 message digest. Cryptology eprint archive report 2004/356. http://eprint.iacr.org/2004/ 356/
    • Cryptology ePrint Archive Report , vol.2004 , Issue.356
    • Mikle, O.1
  • 19
    • 26444539878 scopus 로고    scopus 로고
    • Security analysis of a 2/3-rate double length compression function in the black box model
    • FSE 2005
    • M. Nandi, W. Lee, K. Sakurai, S. Lee. Security analysis of a 2/3-rate double length compression function in the black box model. FSE 2005, LNCS 3557, 243-254.
    • LNCS , vol.3557 , pp. 243-254
    • Nandi, M.1    Lee, W.2    Sakurai, K.3    Lee, S.4
  • 20
    • 8344253818 scopus 로고    scopus 로고
    • FIPS 180-2. August
    • National Institute of Standards and Technology (NIST). Secure hash standard. FIPS 180-2. August 2002.
    • (2002) Secure Hash Standard
  • 23
    • 5644280926 scopus 로고
    • RIPE integrity primitives for secure information systems. Final report of RACE integrity primitives evaluation (RIPE RACE 1040)
    • RIPE integrity primitives for secure information systems. Final report of RACE integrity primitives evaluation (RIPE RACE 1040). LNCS 1007, 1995.
    • (1995) LNCS , vol.1007
  • 24
    • 0001797564 scopus 로고    scopus 로고
    • PayWord and MicroMint - Two simple micropayment schemes
    • R. Rivest, A. Shamir. PayWord and MicroMint - two simple micropayment schemes. CryptoBytes, Vol. 2, # 1 (1996), 7-11.
    • (1996) CryptoBytes , vol.2 , Issue.1 , pp. 7-11
    • Rivest, R.1    Shamir, A.2
  • 25
    • 35048855067 scopus 로고    scopus 로고
    • Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision-resistance
    • FSE 2004
    • P. Rogaway and T. Shrimpton. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision-Resistance. FSE 2004, LNCS 3017, 371-388.
    • LNCS , vol.3017 , pp. 371-388
    • Rogaway, P.1    Shrimpton, T.2
  • 26
    • 24944575304 scopus 로고    scopus 로고
    • Cryptoanalyisis of the hash functions MD4 and RIPEMD
    • Eurocrypt 2005
    • X. Wang, X. Lai, D. Feng, H. Cheng, X. Yu. Cryptoanalyisis of the hash functions MD4 and RIPEMD. Eurocrypt 2005, LNCS 3494, 1-18.
    • LNCS , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Cheng, H.4    Yu, X.5
  • 27
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Eurocrypt 2005
    • X. Wang, H. Yu. How to break MD5 and other hash functions. Eurocrypt 2005, LNCS 3494, 19-35.
    • LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 28
    • 33646748234 scopus 로고    scopus 로고
    • Efficient collision search attacks on SHAO
    • Accepted for
    • X. Wang, H. Yu, Y. L. Yin. Efficient collision search attacks on SHAO. Accepted for Crypto 2005.
    • Crypto 2005
    • Wang, X.1    Yu, H.2    Yin, Y.L.3
  • 29
    • 33646754186 scopus 로고    scopus 로고
    • Finding collisions in the full SHA1
    • Accepted for
    • X. Wang, Y. L. Yin, H. Yu, Finding collisions in the full SHA1. Accepted for Crypto 2005.
    • Crypto 2005
    • Wang, X.1    Yin, Y.L.2    Yu, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.