메뉴 건너뛰기




Volumn 5157 LNCS, Issue , 2008, Pages 397-412

Beyond uniformity: Better security/efficiency tradeoffs for compression functions

Author keywords

[No Author keywords available]

Indexed keywords

DATA COMPRESSION; FUNCTIONS;

EID: 51849094862     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-85174-5_22     Document Type: Conference Paper
Times cited : (47)

References (20)
  • 1
    • 30744457437 scopus 로고    scopus 로고
    • Hash function balance and its impact on birthday attacks
    • Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
    • Bellare, M., Kohno, T.: Hash function balance and its impact on birthday attacks. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 401-418. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 401-418
    • Bellare, M.1    Kohno, T.2
  • 2
    • 24944511624 scopus 로고    scopus 로고
    • On the impossibility of highly efficient blockcipher-based hash functions
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Black, J., Cochran, M., Shrimpton, T.: On the impossibility of highly efficient blockcipher-based hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 526-541. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 526-541
    • Black, J.1    Cochran, M.2    Shrimpton, T.3
  • 3
    • 50449107349 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher-based hashfunction constructions from PGV
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Black, J., Rogaway, P., Shrimpton, T.: Black-box analysis of the block-cipher-based hashfunction constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 4
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Damgård, I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435
    • Damgård, I.1
  • 5
    • 33746721457 scopus 로고    scopus 로고
    • Hirose, S.: Some plausible constructions of double-length hash functions. In: Robshaw, M. (ed.) FSE 2006. LNCS, 4047, pp. 210-225. Springer, Heidelberg (2006)
    • Hirose, S.: Some plausible constructions of double-length hash functions. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 210-225. Springer, Heidelberg (2006)
  • 7
    • 33646815676 scopus 로고    scopus 로고
    • Some attacks against a double length hash proposal
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Knudsen, L., Muller, F.: Some attacks against a double length hash proposal. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 462-473. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 462-473
    • Knudsen, L.1    Muller, F.2
  • 8
    • 51849167537 scopus 로고    scopus 로고
    • Lucks, S.: A collision-resistant rate-1 double-block-length hash function. In: Biham, E., Handschuh, H., Lucks, S., Rijmen, V. (eds.) Symmetric Cryptography, number 07021 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007, Schloss Dagstuhl, Germany. Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI) (2007)
    • Lucks, S.: A collision-resistant rate-1 double-block-length hash function. In: Biham, E., Handschuh, H., Lucks, S., Rijmen, V. (eds.) Symmetric Cryptography, number 07021 in Dagstuhl Seminar Proceedings, Dagstuhl, Germany, 2007, Schloss Dagstuhl, Germany. Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI) (2007)
  • 9
    • 38049140585 scopus 로고    scopus 로고
    • Domain extension of public random functions: Beyond the birthday barrier
    • Menezes, A, ed, CRYPTO 2007, Springer, Heidelberg
    • Maurer, U., Tessaro, S.: Domain extension of public random functions: Beyond the birthday barrier. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 187-204. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 187-204
    • Maurer, U.1    Tessaro, S.2
  • 10
    • 84937461306 scopus 로고
    • One way hash functions and DES
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Merkle, R.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-466. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 428-466
    • Merkle, R.1
  • 11
    • 51849107928 scopus 로고    scopus 로고
    • Domain extension for random oracles: Beyond the birthday-paradox bound
    • Barcelona, May 24-25
    • Mironov, I., Narayanan, A.: Domain extension for random oracles: Beyond the birthday-paradox bound. In: ECRYPT Hash Workshop 2007, Barcelona, May 24-25 (2007)
    • (2007) ECRYPT Hash Workshop
    • Mironov, I.1    Narayanan, A.2
  • 12
    • 26444539878 scopus 로고    scopus 로고
    • Nandi, M., Lee, W., Sakurai, K., Lee, S.: Security analysis of a 2/3-rate double length compression function in black-box model. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, 3557, pp. 243-254. Springer, Heidelberg (2005)
    • Nandi, M., Lee, W., Sakurai, K., Lee, S.: Security analysis of a 2/3-rate double length compression function in black-box model. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 243-254. Springer, Heidelberg (2005)
  • 13
    • 38149022185 scopus 로고    scopus 로고
    • Combining compression functions and block cipher-based hash functions
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Peyrin, T., Gilbert, H., Muller, F., Robshaw, M.: Combining compression functions and block cipher-based hash functions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 315-331. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 315-331
    • Peyrin, T.1    Gilbert, H.2    Muller, F.3    Robshaw, M.4
  • 15
    • 51849087663 scopus 로고    scopus 로고
    • Constructing cryptographic hash functions from fixed-key blockciphers
    • Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
    • Rogaway, P., Steinberger, J.: Constructing cryptographic hash functions from fixed-key blockciphers. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 433-450. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 433-450
    • Rogaway, P.1    Steinberger, J.2
  • 16
    • 44449089437 scopus 로고    scopus 로고
    • Security/efficiency tradeoffs for permutation-based hashing
    • Smart, N, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Rogaway, P., Steinberger, J.: Security/efficiency tradeoffs for permutation-based hashing. In: Smart, N. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 220-236. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 220-236
    • Rogaway, P.1    Steinberger, J.2
  • 17
    • 38149078289 scopus 로고    scopus 로고
    • Seurin, Y., Peyrin, T.: Security analysis of constructions combining FIL random oracles. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 119-136. Springer, Heidelberg (2007)
    • Seurin, Y., Peyrin, T.: Security analysis of constructions combining FIL random oracles. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 119-136. Springer, Heidelberg (2007)
  • 18
    • 51849155326 scopus 로고    scopus 로고
    • Efficient collision-resistant hashing from fixed-length random oracles
    • Barcelona, May 24-25
    • Shrimpton, T., Stam, M.: Efficient collision-resistant hashing from fixed-length random oracles. In: ECRYPT Hash Workshop 2007, Barcelona, May 24-25 (2007)
    • (2007) ECRYPT Hash Workshop
    • Shrimpton, T.1    Stam, M.2
  • 19
    • 49049096334 scopus 로고    scopus 로고
    • Shrimpton, T., Stam, M.: Building a collision-resistant compression function from non-compressing primitives. In: ICALP 2008, Part II, 5126, pp. 643-654. Springer, Heidelberg (2008); Supersedes [18]
    • Shrimpton, T., Stam, M.: Building a collision-resistant compression function from non-compressing primitives. In: ICALP 2008, Part II, vol. 5126, pp. 643-654. Springer, Heidelberg (2008); Supersedes [18]
  • 20
    • 38049103279 scopus 로고    scopus 로고
    • The collision intractability of MDC-2 in the ideal-cipher model
    • Naor, M, ed, EUROCRYPT 2007, Springer, Heidelberg
    • Steinberger, J.: The collision intractability of MDC-2 in the ideal-cipher model. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 34-51. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4515 , pp. 34-51
    • Steinberger, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.