메뉴 건너뛰기




Volumn 5665 LNCS, Issue , 2009, Pages 67-83

Blockcipher-based hashing revisited

Author keywords

[No Author keywords available]

Indexed keywords

BLOCKCIPHER-BASED HASHING; COLLISION RESISTANCE; COMPRESSION FUNCTIONS; GAIN INSIGHT;

EID: 70350754096     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03317-9_5     Document Type: Conference Paper
Times cited : (62)

References (19)
  • 1
    • 38149094108 scopus 로고    scopus 로고
    • Seven-property- preserving iterated hashing: Rox
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Andreeva, E., Neven, G., Preneel, B., Shrimpton, T.: Seven-property- preserving iterated hashing: Rox. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 130-146. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 130-146
    • Andreeva, E.1    Neven, G.2    Preneel, B.3    Shrimpton, T.4
  • 2
    • 70350774147 scopus 로고    scopus 로고
    • Bernstein, D.J.: Cubehash specification (2.b.l). Submission to NIST (2008)
    • Bernstein, D.J.: Cubehash specification (2.b.l). Submission to NIST (2008)
  • 4
    • 44449147491 scopus 로고    scopus 로고
    • On the indifferentiabil-ity of the sponge construction
    • Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the indifferentiabil-ity of the sponge construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 181-197. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 181-197
    • Bertoni, G.1    Daemen, J.2    Peeters, M.3    Van Assche, G.4
  • 5
    • 50449107349 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher-based hash-function constructions from PGV
    • Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
    • Black, J., Rogaway, P., Shrimpton, T.: Black-box analysis of the block-cipher-based hash-function constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320-335. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2442 , pp. 320-335
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 6
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Damgård, I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 416-427
    • Damgård, I.1
  • 7
    • 70350761772 scopus 로고    scopus 로고
    • Duo, L., Li, C.: Improved collision and preimage resistance bounds on PGV schemes. IACR ePrint Archive, Report 2006/462 (2006), http://eprint.iacr.org/ 2006/462
    • Duo, L., Li, C.: Improved collision and preimage resistance bounds on PGV schemes. IACR ePrint Archive, Report 2006/462 (2006), http://eprint.iacr.org/ 2006/462
  • 8
    • 84957799016 scopus 로고
    • Security of iterated hash functions based on block ciphers
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Hohl, W., Lai, X., Meier, T., Waldvogel, C.: Security of iterated hash functions based on block ciphers. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 379-390. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.773 , pp. 379-390
    • Hohl, W.1    Lai, X.2    Meier, T.3    Waldvogel, C.4
  • 9
    • 38149002857 scopus 로고    scopus 로고
    • Knudsen, L.R., Rechberger, C., Thomsen, S.S.: The Grindahl hash functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, 4593, pp. 39-57. Springer, Heidelberg (2007)
    • Knudsen, L.R., Rechberger, C., Thomsen, S.S.: The Grindahl hash functions. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 39-57. Springer, Heidelberg (2007)
  • 11
    • 0022029028 scopus 로고
    • Generating strong one-way functions with cryptographic algorithms
    • Matyas, S., Meyer, C., Oseas, J.: Generating strong one-way functions with cryptographic algorithms. IBM Technical Disclosure Bulletin 27(10a), 5658-5659 (1985)
    • (1985) IBM Technical Disclosure Bulletin , vol.27 , Issue.10 A , pp. 5658-5659
    • Matyas, S.1    Meyer, C.2    Oseas, J.3
  • 13
    • 84937461306 scopus 로고
    • One way hash functions and DES
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Merkle, R.C.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 428-446
    • Merkle, R.C.1
  • 15
    • 85026897539 scopus 로고
    • Hash functions based on block ciphers: A synthetic approach
    • Stinson, D.R, ed, CRYPTO 1993, Springer, Heidelberg
    • Preneel, B., Govaerts, R., Vandewalle, J.: Hash functions based on block ciphers: A synthetic approach. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 368-378. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.773 , pp. 368-378
    • Preneel, B.1    Govaerts, R.2    Vandewalle, J.3
  • 16
    • 35048855067 scopus 로고    scopus 로고
    • Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 371-388. Springer, Heidelberg (2004)
    • Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371-388. Springer, Heidelberg (2004)
  • 17
    • 44449089437 scopus 로고    scopus 로고
    • Security/efficiency tradeoffs for permutation-based hashing
    • Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Rogaway, P., Steinberger, J.: Security/efficiency tradeoffs for permutation-based hashing. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 220-236. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 220-236
    • Rogaway, P.1    Steinberger, J.2
  • 18
    • 51849094862 scopus 로고    scopus 로고
    • Beyond uniformity: Better security/efficiency tradeoffs for compression functions
    • Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
    • Stam, M.: Beyond uniformity: Better security/efficiency tradeoffs for compression functions. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 397-412. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 397-412
    • Stam, M.1
  • 19
    • 70350780267 scopus 로고    scopus 로고
    • Blockcipher based hashing revisited. IACR ePrint Archive
    • Report 2008/071
    • Stam, M.: Blockcipher based hashing revisited. IACR ePrint Archive, Report 2008/071 (2008), http://eprint.iacr.org/2008/071
    • (2008)
    • Stam, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.