메뉴 건너뛰기




Volumn 5665 LNCS, Issue , 2009, Pages 104-121

Indifferentiability of permutation-based compression functions and tree-based modes of operation, with applications to MD6

Author keywords

[No Author keywords available]

Indexed keywords

COMPRESSION FUNCTIONS; FAIR SHARE; FIXED INPUT LENGTHS; INDIFFERENTIABILITY; INPUT/OUTPUT BEHAVIORS; MODE OF OPERATIONS; MODES OF OPERATION; RANDOM ORACLE; STRUCTURAL FLAWS; TREE-BASED; VARIABLE INPUT LENGTHS;

EID: 70350779943     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03317-9_7     Document Type: Conference Paper
Times cited : (33)

References (22)
  • 2
    • 77649268663 scopus 로고    scopus 로고
    • Multi-property-preserving hash domain extension and the EMD transform
    • Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
    • Bellare, M., Ristenpart, T.: Multi-property-preserving hash domain extension and the EMD transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 299-314. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 299-314
    • Bellare, M.1    Ristenpart, T.2
  • 5
    • 44449147491 scopus 로고    scopus 로고
    • On the indifferentiabil-ity of the sponge construction
    • Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the indifferentiabil-ity of the sponge construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 181-197. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 181-197
    • Bertoni, G.1    Daemen, J.2    Peeters, M.3    Van Assche, G.4
  • 6
    • 84904438721 scopus 로고    scopus 로고
    • Sufficient conditions for sound tree hashing modes
    • Handschuh, H, Lucks, S, Preneel, B, Rogaway, P, eds
    • Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sufficient conditions for sound tree hashing modes. In: Handschuh, H., Lucks, S., Preneel, B., Rogaway, P. (eds.) Symmetric Cryptography. Dagstuhl Seminar Proceedings (2009), http://www.dagstuhl.de/Haterials/index.en.phtml?09031
    • (2009) Symmetric Cryptography. Dagstuhl Seminar Proceedings
    • Bertoni, G.1    Daemen, J.2    Peeters, M.3    Van Assche, G.4
  • 7
    • 84957643546 scopus 로고    scopus 로고
    • Differential collisions of SHA-0
    • Krawczyk, H, ed, CRYPTO 1998, Springer, Heidelberg
    • Chabaud, F., Joux, A.: Differential collisions of SHA-0. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 56-71. Springer, Heidelberg (1998)
    • (1998) LNCS , vol.1462 , pp. 56-71
    • Chabaud, F.1    Joux, A.2
  • 8
    • 77649256571 scopus 로고    scopus 로고
    • Indifferentiable security analysis of popular hash functions with prefix-free padding
    • Lai, X, Chen, K, eds, ASI-ACRYPT 2006, Springer, Heidelberg
    • Chang, D., Lee, S., Nandi, M., Yung, M.: Indifferentiable security analysis of popular hash functions with prefix-free padding. In: Lai, X., Chen, K. (eds.) ASI-ACRYPT 2006. LNCS, vol. 4284, pp. 283-298. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 283-298
    • Chang, D.1    Lee, S.2    Nandi, M.3    Yung, M.4
  • 9
    • 33745119040 scopus 로고    scopus 로고
    • Merkle-Damgård revisited: How to construct a hash function
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgård revisited: How to construct a hash function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430-448. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 430-448
    • Coron, J.-S.1    Dodis, Y.2    Malinaud, C.3    Puniya, P.4
  • 11
    • 70350752375 scopus 로고    scopus 로고
    • Dinur, I., Shamir, A.: Cube attack on a reduced version of the compression function with 15 rounds
    • Dinur, I., Shamir, A.: Cube attack on a reduced version of the compression function with 15 rounds
  • 12
    • 44449166046 scopus 로고    scopus 로고
    • A new mode of operation for block ciphers and length-preserving MACs
    • Smart, N.P, ed, EUROCRYPT 2008, Springer, Heidelberg
    • Dodis, Y., Pietrzak, K., Puniya, P.: A new mode of operation for block ciphers and length-preserving MACs. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 198-219. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 198-219
    • Dodis, Y.1    Pietrzak, K.2    Puniya, P.3
  • 13
    • 35048817517 scopus 로고    scopus 로고
    • Maurer, U., Renner, R., Holenstein, C.: Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology. In: Naor, M. (ed.) TCC 2004. LNCS, 2951, pp. 21-39. Springer, Heidelberg (2004)
    • Maurer, U., Renner, R., Holenstein, C.: Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 21-39. Springer, Heidelberg (2004)
  • 14
    • 62349117678 scopus 로고    scopus 로고
    • Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family
    • November 2
    • National Institute of Standards and Technology. Announcing request for candidate algorithm nominations for a new cryptographic hash algorithm (SHA-3) family. Federal Register Notices, vol. 72(212), pp. 62212-62220 (November 2, 2007), http://csrc.nist.gov/groups/ST/hash/documents/FR-Notice-Nov07.pdf
    • (2007) Federal Register Notices , vol.72 , Issue.212 , pp. 62212-62220
  • 15
    • 84869649948 scopus 로고    scopus 로고
    • Announcing the development of new hash algorithm(s) for the revision of Federal Information Processing Standard (FIPS) 1802, secure hash standard
    • January 23
    • National Institute of Standards and Technology. Announcing the development of new hash algorithm(s) for the revision of Federal Information Processing Standard (FIPS) 1802, secure hash standard. Federal Register Notices, vol. 72(14), pp. 2861-2863 (January 23, 2007), http://csrc.nist.gov/groups/ST/ hash/documents/FR-Notice-Jan07.pdf
    • (2007) Federal Register Notices , vol.72 , Issue.14 , pp. 2861-2863
  • 18
    • 24944575304 scopus 로고    scopus 로고
    • Cryptanalysis of the hash functions MD4 and RIPEMD
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Lai, X., Feng, D., Chen, H., Yu, X.: Cryptanalysis of the hash functions MD4 and RIPEMD. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 1-18. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 1-18
    • Wang, X.1    Lai, X.2    Feng, D.3    Chen, H.4    Yu, X.5
  • 19
    • 33745171465 scopus 로고    scopus 로고
    • Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
    • Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
  • 20
    • 24944591357 scopus 로고    scopus 로고
    • How to Break MD5 and Other Hash Functions
    • Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
    • Wang, X., Yu, H.: How to Break MD5 and Other Hash Functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 19-35
    • Wang, X.1    Yu, H.2
  • 21
    • 33745122987 scopus 로고    scopus 로고
    • Efficient Collision Search Attacks on SHA-0
    • Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
    • Wang, X., Yu, H., Yin, Y.L.: Efficient Collision Search Attacks on SHA-0. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 1-16. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 1-16
    • Wang, X.1    Yu, H.2    Yin, Y.L.3
  • 22
    • 54249126405 scopus 로고    scopus 로고
    • Multicollision attack on the compression functions of MD4 and 3-pass HAVAL. IACR ePrint Archive
    • Report 2007/085
    • Yu, H., Wang, X.: Multicollision attack on the compression functions of MD4 and 3-pass HAVAL. IACR ePrint Archive, Report 2007/085 (2007), http://eprint.iacr.org/2007/085
    • (2007)
    • Yu, H.1    Wang, X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.