메뉴 건너뛰기




Volumn 4117 LNCS, Issue , 2006, Pages 570-583

On the impossibility of efficiently combining collision resistant hash functions

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SCIENCE; FUNCTION EVALUATION; SECURITY OF DATA; THEOREM PROVING;

EID: 33749573459     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11818175_34     Document Type: Conference Paper
Times cited : (27)

References (23)
  • 1
    • 0019669180 scopus 로고
    • An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems
    • Charles Asmuth and G. R. Blakely. An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems. Computers and Mathematics with Applications, 7:447-450, 1981.
    • (1981) Computers and Mathematics with Applications , vol.7 , pp. 447-450
    • Asmuth, C.1    Blakely, G.R.2
  • 2
  • 3
    • 24944511624 scopus 로고    scopus 로고
    • On the impossibility of highly efficient blockcipher-based hash functions
    • Proceedings of Eurocrypt '05. Springer-Verlag
    • John Black, Martin Cochran, and Thomas Shrimpton. On the impossibility of highly efficient blockcipher-based hash functions. In Proceedings of Eurocrypt '05, volume 3494 of LNCS. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3494
    • Black, J.1    Cochran, M.2    Shrimpton, T.3
  • 4
    • 33749583766 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher-based hash-function constructions from PGV
    • LNCS. Springer-Verlag
    • John Black, Phillip Rogaway, and Thomas Shrimpton. Black-box analysis of the block-cipher-based hash-function constructions from PGV. In Proceedings of Crypto '02, LNCS. Springer-Verlag, 2002.
    • (2002) Proceedings of Crypto '02
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 5
    • 33745119040 scopus 로고    scopus 로고
    • Merkle-Damgård revisited: How to construct a hash function
    • Proceedings of Crypto '05. Springer-Verlag
    • Jean-Sebastian Coron, Yevgeniy Dodis, Cecile Malinaud, and Prashant Puniya. Merkle-Damgård revisited: how to construct a hash function. In Proceedings of Crypto '05, volume 3621 of LNCS. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3621
    • Coron, J.-S.1    Dodis, Y.2    Malinaud, C.3    Puniya, P.4
  • 6
    • 0001744332 scopus 로고
    • A design principle for hash functions
    • LNCS. Springer-Verlag
    • Ivan B. Damgård. A design principle for hash functions. In Proceedings of Crypto '89, LNCS. Springer-Verlag, 1989.
    • (1989) Proceedings of Crypto '89
    • Damgård, I.B.1
  • 7
    • 24144468589 scopus 로고    scopus 로고
    • Chosen ciphertext security of multiple encryption
    • Yevgeniy Dodis and Jonathan Katz. Chosen ciphertext security of multiple encryption. In Proceedings of TCC '05, pages 188-209, 2005.
    • (2005) Proceedings of TCC '05 , pp. 188-209
    • Dodis, Y.1    Katz, J.2
  • 10
    • 84941148358 scopus 로고    scopus 로고
    • Breaking the ICE - Finding multicollisions in iterated concatenated and expanded (ICE) hash functions
    • Jonathan Hoch and Adi Shamir. Breaking the ICE - finding multicollisions in iterated concatenated and expanded (ICE) hash functions. In Proceedings of FSE '06, 2006.
    • (2006) Proceedings of FSE '06
    • Hoch, J.1    Shamir, A.2
  • 11
    • 24144493423 scopus 로고    scopus 로고
    • How to securely outsource cryptographic computations
    • Susan Hohenberger and Anna Lysyanskaya. How to securely outsource cryptographic computations. In Proceedings of TCC '05, pages 264-282, 2005.
    • (2005) Proceedings of TCC '05 , pp. 264-282
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 12
    • 33645780237 scopus 로고    scopus 로고
    • Multicollisions in iterated hash functions, application to cascaded constructions
    • Proceedings of Crypto '04. Springer-Verlag
    • Antoine Joux. Multicollisions in iterated hash functions, application to cascaded constructions. In Proceedings of Crypto '04, volume 3152 of LNCS, pages 306-316. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3152 , pp. 306-316
    • Joux, A.1
  • 13
    • 84941149388 scopus 로고    scopus 로고
    • Can we get a reduction proof for truncated hashes?
    • John Kelsey. Can we get a reduction proof for truncated hashes? Crypto '05 rump session, 2005.
    • (2005) Crypto '05 Rump Session
    • Kelsey, J.1
  • 15
    • 0000966673 scopus 로고
    • One way hash functions and des
    • LNCS. Springer-Verlag
    • Ralph C. Merkle. One way hash functions and DES. In Proceedings of Crypto '89, LNCS. Springer-Verlag, 1989.
    • (1989) Proceedings of Crypto '89
    • Merkle, R.C.1
  • 17
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • Moni Naor and Moti Yung. Universal one-way hash functions and their cryptographic applications. In Proceedings of STOC'89, pages 33-43, 1989.
    • (1989) Proceedings of STOC'89 , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 19
    • 0002270245 scopus 로고
    • Hash functions based on block ciphers: A synthetic approach
    • LNCS. Springer-Verlag
    • Bart Preneel, René Govaerts, and Joos Vandewalle. Hash functions based on block ciphers: A synthetic approach. In Proceedings of Crypto '93, LNCS. Springer-Verlag, 1993.
    • (1993) Proceedings of Crypto '93
    • Preneel, B.1    Govaerts, R.2    Vandewalle, J.3
  • 20
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the hash functions MD4 and RIPEMD
    • Proceedings of Eurocrypt '05. Springer-Verlag
    • Xiaoyun Wang, Xuejia Lai, Dengguo Feng, Hui Chen, and Xiuyuan Yu. Cryptanalysis of the hash functions MD4 and RIPEMD. In Proceedings of Eurocrypt '05, volume 3494 of LNCS, pages 1-18. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 22
    • 33745171465 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1
    • Proceedings of Crypto '05. Springer-Verlag
    • Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu. Finding collisions in the full SHA-1. In Proceedings of Crypto '05, volume 3621 of LNCS. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3621
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 23
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Proceedings of Eurocrypt '05. Springer-Verlag
    • Xiaoyun Wang and Hongbo Yu. How to break MD5 and other hash functions. In Proceedings of Eurocrypt '05, volume 3494 of LNCS, pages 19-35. Springer-Verlag, 2005.
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.