메뉴 건너뛰기




Volumn 4515 LNCS, Issue , 2007, Pages 23-33

Non-trivial black-box combiners for collision-resistant hash-functions don't exist

Author keywords

[No Author keywords available]

Indexed keywords

COLLISION AVOIDANCE; COMPUTATIONAL METHODS; FORMAL METHODS; FUNCTION EVALUATION;

EID: 38049120894     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-72540-4_2     Document Type: Conference Paper
Times cited : (23)

References (19)
  • 1
    • 0019669180 scopus 로고
    • An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems
    • C. A. Asmuth and G. R. Blakley. An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems. Computers and Mathematics with Applications, pages 447-450, 1981.
    • (1981) Computers and Mathematics with Applications , pp. 447-450
    • Asmuth, C.A.1    Blakley, G.R.2
  • 2
    • 38049102616 scopus 로고    scopus 로고
    • On the impossibility of efficiently combining collision resistant hash functions
    • Dan Boneh and Xavier Boyen. On the impossibility of efficiently combining collision resistant hash functions. In CRYPTO, 2006.
    • (2006) CRYPTO
    • Boneh, D.1    Boyen, X.2
  • 3
    • 33746095782 scopus 로고    scopus 로고
    • Vsh, an efficient and provable collision-resistant hash function
    • Scott Contini, Arjen K. Lenstra, and Ron Steinfeld. Vsh, an efficient and provable collision-resistant hash function. In EUROCRYPT, pages 165-182, 2006.
    • (2006) EUROCRYPT , pp. 165-182
    • Contini, S.1    Lenstra, A.K.2    Steinfeld, R.3
  • 4
    • 33745119040 scopus 로고    scopus 로고
    • Merkle-damgård revisited : How to construct a hash function
    • Advances in Cryptology, CRYPTO '05, of
    • Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, and Prashant Puniya. Merkle-damgård revisited : How to construct a hash function. In Advances in Cryptology - CRYPTO '05, volume 3621 of Lecture Notes in Computer Science, pages 430-448, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 430-448
    • Coron, J.1    Dodis, Y.2    Malinaud, C.3    Puniya, P.4
  • 5
    • 24144468589 scopus 로고    scopus 로고
    • Chosen-ciphertext security of multiple encryption
    • Yevgeniy Dodis and Jonathan Katz. Chosen-ciphertext security of multiple encryption. In TCC, pages 188-209, 2005.
    • (2005) TCC , pp. 188-209
    • Dodis, Y.1    Katz, J.2
  • 6
    • 0022069123 scopus 로고
    • On the power of cascade ciphers
    • Shimon Even and Oded Goldreich. On the power of cascade ciphers. ACM Trans. Comput. Syst., 3(2):108-116, 1985.
    • (1985) ACM Trans. Comput. Syst , vol.3 , Issue.2 , pp. 108-116
    • Even, S.1    Goldreich, O.2
  • 7
    • 24944472289 scopus 로고    scopus 로고
    • On robust combiners for oblivious transfer and other primitives
    • Danny Harnik, Joe Kilian, Moni Naor, Orner Reingold, and Alon Rosen. On robust combiners for oblivious transfer and other primitives. In EUROCRYPT, pages 96-113, 2005.
    • (2005) EUROCRYPT , pp. 96-113
    • Harnik, D.1    Kilian, J.2    Naor, M.3    Reingold, O.4    Rosen, A.5
  • 8
    • 24144475180 scopus 로고    scopus 로고
    • On tolerant cryptographic constructions
    • Amir Herzberg. On tolerant cryptographic constructions. In CT-RSA, pages 172-190, 2005.
    • (2005) CT-RSA , pp. 172-190
    • Herzberg, A.1
  • 9
    • 33645780237 scopus 로고    scopus 로고
    • Multicollisions in iterated hash functions. application to cascaded constructions
    • Antoine Joux. Multicollisions in iterated hash functions. application to cascaded constructions. In CRYPTO, pages 306-316, 2004.
    • (2004) CRYPTO , pp. 306-316
    • Joux, A.1
  • 10
    • 38049136297 scopus 로고    scopus 로고
    • Jonathan Katz and Chiu-Yuen Koo. On constructing universal one-way hash functions from arbitrary one-way functions, 2005. Cryptology ePrint Archive: Report 2005/328.
    • Jonathan Katz and Chiu-Yuen Koo. On constructing universal one-way hash functions from arbitrary one-way functions, 2005. Cryptology ePrint Archive: Report 2005/328.
  • 11
    • 0027308007 scopus 로고
    • Cascade ciphers: The importance of being first
    • Ueli M. Maurer and James L. Massey. Cascade ciphers: The importance of being first. J. Cryptology, 6(1):55-61, 1993.
    • (1993) J. Cryptology , vol.6 , Issue.1 , pp. 55-61
    • Maurer, U.M.1    Massey, J.L.2
  • 12
    • 33749557902 scopus 로고    scopus 로고
    • On robust combiners for private information retrieval and other primitives
    • Cynthia Dwork, editor, CRYPTO '06, of
    • Remo Meier and Bartosz Przydatek. On robust combiners for private information retrieval and other primitives. In Cynthia Dwork, editor, CRYPTO '06, volume 4117 of Lecture Notes in Computer Science, pages 555-569, 2006.
    • (2006) Lecture Notes in Computer Science , vol.4117 , pp. 555-569
    • Meier, R.1    Przydatek, B.2
  • 14
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • Moni Naor and Moti Yung. Universal one-way hash functions and their cryptographic applications. In STOC, pages 33-43, 1989.
    • (1989) STOC , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 15
    • 38049155317 scopus 로고    scopus 로고
    • Phillip Rogaway. Formalizing human ignorance: Collision-resistant hashing without the keys, 2006. Cryptology ePrint Archive: Report 2006/281.
    • Phillip Rogaway. Formalizing human ignorance: Collision-resistant hashing without the keys, 2006. Cryptology ePrint Archive: Report 2006/281.
  • 16
    • 0025152622 scopus 로고
    • One-way functions are necessary and sufficient for secure signatures
    • John Rompel. One-way functions are necessary and sufficient for secure signatures. In STOC, pages 387-394, 1990.
    • (1990) STOC , pp. 387-394
    • Rompel, J.1
  • 17
    • 84957690790 scopus 로고    scopus 로고
    • Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
    • Daniel R. Simon. Finding collisions on a one-way street: Can secure hash functions be based on general assumptions? In EUROCRYPT, pages 334-345, 1998.
    • (1998) EUROCRYPT , pp. 334-345
    • Simon, D.R.1
  • 18
    • 33745171465 scopus 로고    scopus 로고
    • Finding collisions in the full sha-1
    • Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu. Finding collisions in the full sha-1. In CRYPTO, pages 17-36, 2005.
    • (2005) CRYPTO , pp. 17-36
    • Wang, X.1    Lisa Yin, Y.2    Yu, H.3
  • 19
    • 24944591357 scopus 로고    scopus 로고
    • How to break md5 and other hash functions
    • Xiaoyun Wang and Hongbo Yu. How to break md5 and other hash functions. In EUROCRYPT, pages 19-35, 2005.
    • (2005) EUROCRYPT , pp. 19-35
    • Wang, X.1    Yu, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.