메뉴 건너뛰기




Volumn 4833 LNCS, Issue , 2007, Pages 130-146

Seven-property-preserving iterated hashing: ROX

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; ITERATIVE METHODS; PROBLEM SOLVING; RANDOM PROCESSES; SECURITY OF DATA;

EID: 38149094108     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-76900-2_8     Document Type: Conference Paper
Times cited : (48)

References (33)
  • 1
    • 38149001822 scopus 로고    scopus 로고
    • Seven-property- preserving iterated hashing: ROX. Cryptology ePrint Archive
    • Report 2007/176
    • Andreeva, E., Neven, G., Preneel, B., Shrimpton, T.: Seven-property- preserving iterated hashing: ROX. Cryptology ePrint Archive, Report 2007/176 (2007)
    • (2007)
    • Andreeva, E.1    Neven, G.2    Preneel, B.3    Shrimpton, T.4
  • 2
    • 38149131990 scopus 로고    scopus 로고
    • Three-property preserving iterations of keyless compression functions
    • Workshop
    • Andreeva, E., Neven, G., Preneel, B., Shrimpton, T.: Three-property preserving iterations of keyless compression functions. In: ECRYPT Hash Workshop (2007)
    • (2007) ECRYPT Hash
    • Andreeva, E.1    Neven, G.2    Preneel, B.3    Shrimpton, T.4
  • 3
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
    • Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 4
    • 77649268663 scopus 로고    scopus 로고
    • Multi-property-preserving hash domain extension: The EMD transform
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Bellare, M., Ristenpart, T.: Multi-property-preserving hash domain extension: The EMD transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 299-314. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 299-314
    • Bellare, M.1    Ristenpart, T.2
  • 5
    • 38149004817 scopus 로고    scopus 로고
    • Hash functions in the dedicated-key setting: Design choices and MPP transforms
    • Arge, L, Cachin, C, Tarlecki, A, eds, ICALP 2007. 34th International Colloquium on Automata, Languages and Programming, Springer, Heidelberg
    • Bellare, M., Ristenpart, T.: Hash functions in the dedicated-key setting: Design choices and MPP transforms. In: Arge, L., Cachin, C., Tarlecki, A. (eds.) ICALP 2007. 34th International Colloquium on Automata, Languages and Programming. LNCS, vol. 4596, Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4596
    • Bellare, M.1    Ristenpart, T.2
  • 7
    • 84958663551 scopus 로고    scopus 로고
    • Collision-resistant hashing: Towards making UOWHFs practical
    • Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
    • Bellare, M., Rogaway, P.: Collision-resistant hashing: Towards making UOWHFs practical. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294
    • Bellare, M.1    Rogaway, P.2
  • 9
    • 33745119040 scopus 로고    scopus 로고
    • Merkle-Damgård revisited: How to construct a hash function
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgård revisited: How to construct a hash function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430-448. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 430-448
    • Coron, J.-S.1    Dodis, Y.2    Malinaud, C.3    Puniya, P.4
  • 10
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33(1), 167-226 (2003)
    • (2003) SIAM Journal on Computing , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 11
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Damgård, I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 416-427
    • Damgård, I.1
  • 13
    • 33749549095 scopus 로고    scopus 로고
    • Strengthening digital signatures via randomized hashing
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Halevi, S., Krawczyk, H.: Strengthening digital signatures via randomized hashing. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 41-59. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 41-59
    • Halevi, S.1    Krawczyk, H.2
  • 14
    • 33746056045 scopus 로고    scopus 로고
    • Kelsey, J., Kohno, T.: Herding hash functions and the Nostradamus attack. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, 4004, pp. 183-200. Springer, Heidelberg (2006), from http://eprint.iacr.org/2005/281
    • Kelsey, J., Kohno, T.: Herding hash functions and the Nostradamus attack. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 183-200. Springer, Heidelberg (2006), from http://eprint.iacr.org/2005/281
  • 15
    • 24944541563 scopus 로고    scopus 로고
    • n work
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • n work. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 474-490. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 474-490
    • Kelsey, J.1    Schneier, B.2
  • 16
    • 84985820553 scopus 로고
    • Hash functions based on block ciphers
    • Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
    • Lai, X., Massey, J.L.: Hash functions based on block ciphers. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 55-70. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.658 , pp. 55-70
    • Lai, X.1    Massey, J.L.2
  • 17
    • 0345490606 scopus 로고    scopus 로고
    • New parallel domain extenders for UOWHF
    • Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
    • Lee, W., Chang, D., Lee, S., Sung, S.H., Nandi, M.: New parallel domain extenders for UOWHF. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 208-227. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2894 , pp. 208-227
    • Lee, W.1    Chang, D.2    Lee, S.3    Sung, S.H.4    Nandi, M.5
  • 18
    • 0024867460 scopus 로고
    • A study of password security
    • Luby, M., Rackoff, C.: A study of password security. Journal of Cryptology 1(3), 151-158 (1989)
    • (1989) Journal of Cryptology , vol.1 , Issue.3 , pp. 151-158
    • Luby, M.1    Rackoff, C.2
  • 19
    • 33646776051 scopus 로고    scopus 로고
    • A failure-friendly design principle for hash functions
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Lucks, S.: A failure-friendly design principle for hash functions. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 474-494. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 474-494
    • Lucks, S.1
  • 20
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • IEEE Computer Society Press, Los Alamitos
    • Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy, pp. 122-134. IEEE Computer Society Press, Los Alamitos (1980)
    • (1980) IEEE Symposium on Security and Privacy , pp. 122-134
    • Merkle, R.C.1
  • 21
    • 84969346266 scopus 로고
    • A certified digital signature
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 218-238
    • Merkle, R.C.1
  • 22
    • 84937461306 scopus 로고
    • One way hash functions and DES
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Merkle, R.C.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 428-446
    • Merkle, R.C.1
  • 23
    • 84945124866 scopus 로고    scopus 로고
    • Hash functions: From Merkle-Damgård to Shoup
    • Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
    • Mironov, I.: Hash functions: From Merkle-Damgård to Shoup. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 166-181. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2045 , pp. 166-181
    • Mironov, I.1
  • 24
    • 33745835370 scopus 로고    scopus 로고
    • Collision-resistant no more: Hash-and-sign paradigm revisited
    • PKC, Springer, Heidelberg
    • Mironov, I.: Collision-resistant no more: Hash-and-sign paradigm revisited. In: PKC 2006. LNCS, pp. 140-156. Springer, Heidelberg (2006)
    • (2006) LNCS , pp. 140-156
    • Mironov, I.1
  • 25
    • 0024867751 scopus 로고
    • Universal one-way hash functions and their cryptographic applications
    • ACM Press, New York
    • Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: 21st ACM STOC, pp. 33-43. ACM Press, New York (1989)
    • (1989) 21st ACM STOC , pp. 33-43
    • Naor, M.1    Yung, M.2
  • 26
    • 84937420653 scopus 로고    scopus 로고
    • Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Nielsen, J.B.: Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 111-126. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 111-126
    • Nielsen, J.B.1
  • 27
    • 84887264252 scopus 로고    scopus 로고
    • Formalizing human ignorance: Collision-resistant hashing without the keys
    • Nguyen, P.Q, ed, VIETCRYPT 2006, Springer, Heidelberg
    • Rogaway, P.: Formalizing human ignorance: Collision-resistant hashing without the keys. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4341
    • Rogaway, P.1
  • 28
    • 35048855067 scopus 로고    scopus 로고
    • Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 371-388. Springer, Heidelberg (2004)
    • Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371-388. Springer, Heidelberg (2004)
  • 29
    • 29144505048 scopus 로고    scopus 로고
    • Masking-based domain extenders for UOWHFs: Bounds and constructions
    • Sarkar, P.: Masking-based domain extenders for UOWHFs: bounds and constructions. IEEE Transactions on Information Theory 51(12), 4299-4311 (2005)
    • (2005) IEEE Transactions on Information Theory , vol.51 , Issue.12 , pp. 4299-4311
    • Sarkar, P.1
  • 30
    • 84948968075 scopus 로고    scopus 로고
    • A composition theorem for universal one-way hash functions
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Shoup, V.: A composition theorem for universal one-way hash functions. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 445-452. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 445-452
    • Shoup, V.1
  • 31
    • 38149033239 scopus 로고    scopus 로고
    • Proofs of security for the Unix password hashing algorithm
    • Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
    • Wagner, D., Goldberg, I.: Proofs of security for the Unix password hashing algorithm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1976
    • Wagner, D.1    Goldberg, I.2
  • 32
    • 33745171465 scopus 로고    scopus 로고
    • Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
    • Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
  • 33
    • 24944591357 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.