메뉴 건너뛰기




Volumn 4284 LNCS, Issue , 2006, Pages 283-298

Indifferentiable security analysis of popular hash functions with prefix-free padding

Author keywords

[No Author keywords available]

Indexed keywords

BLOCK LENGTHS; CONSTRUCTION STRATEGIES; FORMAL PROOFS; GENERIC ANALYSIS; IDEAL-CIPHER MODEL; INDIFFERENTIABILITY; INDISTINGUISHABILITY; PREFIX-FREE; RANDOM ORACLE MODEL; SECURITY ANALYSIS;

EID: 77649256571     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11935230_19     Document Type: Conference Paper
Times cited : (41)

References (20)
  • 2
    • 50449107349 scopus 로고    scopus 로고
    • Black-box analysis of the blockcipher-based hash function constructions from PGV
    • Advances in Cryptology-Crypto'2002, of, Springer-Verlag
    • J. Black, P. Rogaway, and T. Shrimpton. Black-box analysis of the blockcipher-based hash function constructions from PGV. In Advances in Cryptology-Crypto'2002, volume 2442 of Lecture Notes in Computer Science, pages 320-335. Springer-Verlag, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2442 , pp. 320-335
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 3
    • 0013058662 scopus 로고
    • Data authentication using modification detection codes based on a public one way encryption function ,
    • U.S. Patent Number 4,908,861, March 13
    • B. O. Brachtl, D. Coppersmith, M. M. Hyden, S. M. Matyas, C. H.Meyer, J. Oseas, S. Pilpel, and M. Schilling, "Data authentication using modification detection codes based on a public one way encryption function ," U.S. Patent Number 4,908,861, March 13, 1990.
    • (1990)
    • Brachtl, B.O.1    Coppersmith, D.2    Hyden, M.M.3    Matyas, S.M.4    Meyer, C.H.5    Oseas, J.6    Pilpel, S.7    Schilling, M.8
  • 4
    • 84985833497 scopus 로고
    • LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
    • Advances in Cryptology-Auscrypt'1990, of, Springer-Verlag
    • L. Brown, J. Pieprzyk and J. Seberry. LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications. In Advances in Cryptology-Auscrypt'1990, volume 453 of Lecture Notes in Computer Science, pages 229-236. Springer-Verlag, 1990.
    • (1990) Lecture Notes in Computer Science , vol.453 , pp. 229-236
    • Brown, L.1    Pieprzyk, J.2    Seberry, J.3
  • 5
    • 33745119040 scopus 로고    scopus 로고
    • Merkle-Damgard Revisited: How to Construct a Hash Function
    • Advances in Cryptology-Crypto'2005, of, Springer-Verlag
    • J. S. Coron, Y. Dodis, C.Malinaud and P. Puniya. Merkle-Damgard Revisited: How to Construct a Hash Function. In Advances in Cryptology-Crypto'2005, volume 3621 of Lecture Notes in Computer Science, pages 430-448. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3621 , pp. 430-448
    • Coron, J.S.1    Dodis, Y.2    Malinaud, C.3    Puniya, P.4
  • 6
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • Advances in Cryptology-Crypto'1989, of, Springer-Verlag
    • I. B. Damgard. A design principle for hash functions. In Advances in Cryptology-Crypto'1989, volume 435 of Lecture Notes in Computer Science, pages 416-427. Springer-Verlag, 1989.
    • (1989) Lecture Notes in Computer Science , vol.435 , pp. 416-427
    • Damgard, I.B.1
  • 7
    • 85029454400 scopus 로고
    • A construction of a cipher from a single pseudorandom permutation
    • Advances in Cryptology-Asiacrypt'1991, of, Springer-Verlag
    • S. Even, and Y. Mansour. A construction of a cipher from a single pseudorandom permutation. In Advances in Cryptology-Asiacrypt'1991, volume 739 of Lecture Notes in Computer Science, pages 210-224. Springer-Verlag, 1992.
    • (1992) Lecture Notes in Computer Science , vol.739 , pp. 210-224
    • Even, S.1    Mansour, Y.2
  • 8
    • 24944500380 scopus 로고    scopus 로고
    • Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
    • ICISC'2004, of, Springer-Verlag
    • S. Hirose. Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. In ICISC'2004, volume 3506 of Lecture Notes in Computer Science, pages 330-342. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3506 , pp. 330-342
    • Hirose, S.1
  • 9
    • 33750056864 scopus 로고    scopus 로고
    • Some Plausible Constructions of Double-Block-Length Hash Functions
    • To appear in
    • S. Hirose. Some Plausible Constructions of Double-Block-Length Hash Functions. To appear in proceeding of FSE' 2006.
    • (2006) proceeding of FSE
    • Hirose, S.1
  • 10
    • 0037614498 scopus 로고    scopus 로고
    • How to protect DES against exhaustive key search
    • Earlier version in CRYPTO' 96
    • J. Kilian, and P. Rogaway. How to protect DES against exhaustive key search. In Journal of Cryptology, 14(1):17-35, 2001, Earlier version in CRYPTO' 96.
    • (2001) Journal of Cryptology , vol.14 , Issue.1 , pp. 17-35
    • Kilian, J.1    Rogaway, P.2
  • 11
    • 84985820553 scopus 로고
    • Hash Functions Based on Block Ciphers
    • Advances in Cryptology-Eurocrypt'1992, of, Springer-Verlag
    • X. Lai and J. L. Massey. Hash Functions Based on Block Ciphers. In Advances in Cryptology-Eurocrypt'1992, volume 658 of Lecture Notes in Computer Science, pages 55-70. Springer-Verlag, 1993.
    • (1993) Lecture Notes in Computer Science , vol.658 , pp. 55-70
    • Lai, X.1    Massey, J.L.2
  • 12
    • 33646776051 scopus 로고    scopus 로고
    • Failure-Friendly Design Principle for Hash Functions
    • Advances in Cryptology-Asiacrypt'2005, of, Springer-Verlag
    • Stefan Lucks. A Failure-Friendly Design Principle for Hash Functions. In Advances in Cryptology-Asiacrypt'2005, volume 3788 of Lecture Notes in Computer Science, pages 474-494. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3788 , pp. 474-494
    • Stefan Lucks, A.1
  • 13
    • 35048817517 scopus 로고    scopus 로고
    • Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
    • TCC'2004, of, Springer-Verlag
    • U. Maurer, R. Renner and C. Holenstein. Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. In TCC'2004, volume 2951 of Lecture Notes in Computer Science, pages 21-39. Springer-Verlag, 2004.
    • (2004) Lecture Notes in Computer Science , vol.2951 , pp. 21-39
    • Maurer, U.1    Renner, R.2    Holenstein, C.3
  • 14
    • 84937461306 scopus 로고
    • One way hash functions and DES
    • Advances in Cryptology-Crypto'1989, of, Springer-Verlag
    • R. C. Merkle. One way hash functions and DES. In Advances in Cryptology-Crypto'1989, volume 435 of Lecture Notes in Computer Science, pages 428-446. Springer-Verlag, 1990.
    • (1990) Lecture Notes in Computer Science , vol.435 , pp. 428-446
    • Merkle, R.C.1
  • 15
    • 33646833289 scopus 로고    scopus 로고
    • Towards Optimal Double-Length Hash Functions
    • Indocrypt'2005, of, Springer-Verlag
    • Mridul Nandi. Towards Optimal Double-Length Hash Functions. In Indocrypt'2005, volume 3797 of Lecture Notes in Computer Science, pages 77-89. Springer-Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3797 , pp. 77-89
    • Nandi, M.1
  • 17
    • 85026897539 scopus 로고
    • Hash Functions based on Block Ciphers : A Synthetic approach
    • Advances in Cryptology-Crypto'1993, of, Springer-Verlag
    • B. Preneel, R. Govaerts and J. Vandewalle. Hash Functions based on Block Ciphers : A Synthetic approach. In Advances in Cryptology-Crypto'1993, volume 773 of Lecture Notes in Computer Science, pages 368-378. Springer-Verlag, 1994.
    • (1994) Lecture Notes in Computer Science , vol.773 , pp. 368-378
    • Preneel, B.1    Govaerts, R.2    Vandewalle, J.3
  • 18
    • 84985801328 scopus 로고
    • 2n-bit Hash Functions Using n-bit Symmetric Block Cipher Algorithms
    • Advances in Cryptology-Eurocrypt'1989, of, Springer-Verlag
    • J. J. Quisquater and M. Girault. 2n-bit Hash Functions Using n-bit Symmetric Block Cipher Algorithms. In Advances in Cryptology-Eurocrypt'1989, volume 434 of Lecture Notes in Computer Science, pages 102-109. Springer-Verlag, 1990.
    • (1990) Lecture Notes in Computer Science , vol.434 , pp. 102-109
    • Quisquater, J.J.1    Girault, M.2
  • 19
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon. Communication theory of secrecy systems. Bell Systems Technical Journal, 28(4): pages 656-715, 1949.
    • (1949) Bell Systems Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.