메뉴 건너뛰기




Volumn 4593 LNCS, Issue , 2007, Pages 119-136

Security analysis of constructions combining FIL random oracles

Author keywords

Block ciphers; Compression functions; Hash functions; Provable security; Random oracle

Indexed keywords

CRYPTOGRAPHY; FUNCTION EVALUATION; PARAMETER ESTIMATION;

EID: 38149078289     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-74619-5_8     Document Type: Conference Paper
Times cited : (8)

References (29)
  • 1
    • 77649268663 scopus 로고    scopus 로고
    • Multi-property-preserving hash domain extension and the EMD transform
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Bellare, M., Ristenpart, T.: Multi-property-preserving hash domain extension and the EMD transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 299-314. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 299-314
    • Bellare, M.1    Ristenpart, T.2
  • 2
    • 50449107349 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher-based hash-function constructions from PGV
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Black, J.R., Rogaway, P., Shrimpton, T.: Black-box analysis of the block-cipher-based hash-function constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320-335. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 320-335
    • Black, J.R.1    Rogaway, P.2    Shrimpton, T.3
  • 3
    • 0013058662 scopus 로고
    • Data authentication using modification dectection codes based on a public one way encryption function
    • U.S. Patent No. 4,908,861 March 13
    • Coppersmith, D., Pilpel, S., Meyer, C.H., Matyas, S.M., Hyden, M.M., Oseas, J., Brachtl, B., Schilling, M.: Data authentication using modification dectection codes based on a public one way encryption function. U.S. Patent No. 4,908,861 (March 13, 1990)
    • (1990)
    • Coppersmith, D.1    Pilpel, S.2    Meyer, C.H.3    Matyas, S.M.4    Hyden, M.M.5    Oseas, J.6    Brachtl, B.7    Schilling, M.8
  • 4
    • 33745119040 scopus 로고    scopus 로고
    • Merkle-Damgard revisited: How to construct a hash function
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgard revisited: How to construct a hash function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430-448. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 430-448
    • Coron, J.-S.1    Dodis, Y.2    Malinaud, C.3    Puniya, P.4
  • 5
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Damg̊rd, I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 416-427
    • Damg̊rd, I.1
  • 6
    • 24944500380 scopus 로고    scopus 로고
    • Hirose, S.: Provably secure double-block-length hash functions in a black-box model. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, 3506, pp. 330-342. Springer, Heidelberg (2005)
    • Hirose, S.: Provably secure double-block-length hash functions in a black-box model. In: Park, C.-s., Chee, S. (eds.) ICISC 2004. LNCS, vol. 3506, pp. 330-342. Springer, Heidelberg (2005)
  • 7
    • 38149010229 scopus 로고    scopus 로고
    • Hirose, S.: In: Robshaw, M. (ed.) FSE 2006. LNCS, 4047, Springer, Heidelberg (2006)
    • Hirose, S.: In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, Springer, Heidelberg (2006)
  • 8
    • 33645780237 scopus 로고    scopus 로고
    • Joux, A.: Multicollisions in iterated hash functions. application to cascaded constructions. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, 3152, pp. 306-316. Springer, Heidelberg (2004)
    • Joux, A.: Multicollisions in iterated hash functions. application to cascaded constructions. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 306-316. Springer, Heidelberg (2004)
  • 9
    • 24944541563 scopus 로고    scopus 로고
    • n work
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • n work. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 474-490. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 474-490
    • Kelsey, J.1    Schneier, B.2
  • 10
    • 35248889035 scopus 로고
    • New attacks on all double block length hash functions of hash rate 1, including the parallel-DM
    • De Santis, A, ed, EUROCRYPT 1994, Springer, Heidelberg
    • Knudsen, L.R, Lai, X.: New attacks on all double block length hash functions of hash rate 1, including the parallel-DM. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 410-418. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.950 , pp. 410-418
    • Knudsen, L.R.1    Lai, X.2
  • 11
    • 33646815676 scopus 로고    scopus 로고
    • Some attacks against a double length hash proposal
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Knudsen, L.R., Muller, F.: Some attacks against a double length hash proposal. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 462-473. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 462-473
    • Knudsen, L.R.1    Muller, F.2
  • 12
    • 84941161050 scopus 로고    scopus 로고
    • Knudsen, L.R., Preneel, B.: Hash functions based on block ciphers and quaternary codes. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, 1163, pp. 77-90. Springer, Heidelberg (1996)
    • Knudsen, L.R., Preneel, B.: Hash functions based on block ciphers and quaternary codes. In: Kim, K.-c., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 77-90. Springer, Heidelberg (1996)
  • 13
    • 84958591161 scopus 로고    scopus 로고
    • Fast and secure hashing based on codes
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Knudsen, L.R., Preneel, B.: Fast and secure hashing based on codes. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 485-498. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 485-498
    • Knudsen, L.R.1    Preneel, B.2
  • 14
    • 0036714381 scopus 로고    scopus 로고
    • Construction of secure and fast hash functions using nonbinary error-correcting codes
    • Knudsen, L.R., Preneel, B.: Construction of secure and fast hash functions using nonbinary error-correcting codes. IEEE Transactions on Information Theory 48(9), 2524-2539 (2002)
    • (2002) IEEE Transactions on Information Theory , vol.48 , Issue.9 , pp. 2524-2539
    • Knudsen, L.R.1    Preneel, B.2
  • 15
    • 84985820553 scopus 로고
    • Hash function based on block ciphers
    • Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
    • Lai, X., Massey, J.L.: Hash function based on block ciphers. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 55-70. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.658 , pp. 55-70
    • Lai, X.1    Massey, J.L.2
  • 16
    • 84957799016 scopus 로고
    • Security of iterated hash functions based on block ciphers
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Lai, X., Waldvogel, C., Hohl, W., Meier, T.: Security of iterated hash functions based on block ciphers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 379-390. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 379-390
    • Lai, X.1    Waldvogel, C.2    Hohl, W.3    Meier, T.4
  • 18
    • 84937461306 scopus 로고
    • One way hash functions and DES
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Merkle, R.C: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 428-446
    • Merkle, R.C.1
  • 20
    • 26444539878 scopus 로고    scopus 로고
    • Nandi, M., Lee, W., Sakurai, K., Lee, S.: Security analysis of a 2/3-rate double length compression function in black-box model. In; Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, 3557, pp. 243-254. Springer, Heidelberg (2005)
    • Nandi, M., Lee, W., Sakurai, K., Lee, S.: Security analysis of a 2/3-rate double length compression function in black-box model. In; Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 243-254. Springer, Heidelberg (2005)
  • 21
    • 38149022185 scopus 로고    scopus 로고
    • Combining compression functions and block cipher-based hash functions
    • Lai, X, Chen, K, eds, ASI-ACRYPT 2006, Springer, Heidelberg
    • Peyrin, T., Gilbert, H., Muller, F., Robshaw, M.J.B.: Combining compression functions and block cipher-based hash functions. In: Lai, X., Chen, K. (eds.) ASI-ACRYPT 2006. LNCS, vol. 4284, pp. 315-331. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 315-331
    • Peyrin, T.1    Gilbert, H.2    Muller, F.3    Robshaw, M.J.B.4
  • 23
    • 85026897539 scopus 로고
    • Hash functions based on block ciphers: A synthetic approach
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Preneel, B., Govaerts, R., Vandewalle, J.: Hash functions based on block ciphers: A synthetic approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 368-378. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.773 , pp. 368-378
    • Preneel, B.1    Govaerts, R.2    Vandewalle, J.3
  • 24
    • 84985801328 scopus 로고
    • 2n-bit hash-functions using n-bit symmetric block cipher algorithms
    • Quisquater, J.-J, Vandewalle, J, eds, EUROCRYPT 1989, Springer, Heidelberg
    • Quisquater, J.-J., Girault, M.: 2n-bit hash-functions using n-bit symmetric block cipher algorithms. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 102-109. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.434 , pp. 102-109
    • Quisquater, J.-J.1    Girault, M.2
  • 25
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal 28(4), 656-715 (1949)
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.1
  • 26
    • 84937428040 scopus 로고    scopus 로고
    • A generalized birthday problem
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Wagner, D.: A generalized birthday problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288-303. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 288-303
    • Wagner, D.1
  • 27
    • 33745171465 scopus 로고    scopus 로고
    • Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
    • Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
  • 28
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 29
    • 0021140198 scopus 로고
    • A secure one-way hash function built from DES
    • IEEE Computer Society Press, Los Alamitos
    • Winternitz, R.S.: A secure one-way hash function built from DES. In: IEEE Symposium on Security and Privacy, pp. 88-90. IEEE Computer Society Press, Los Alamitos (1984)
    • (1984) IEEE Symposium on Security and Privacy , pp. 88-90
    • Winternitz, R.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.