메뉴 건너뛰기




Volumn 7417 LNCS, Issue , 2012, Pages 348-366

To hash or not to hash again? (In)differentiability results for H 2 and HMAC

Author keywords

Hash functions; HMAC; Indifferentiability

Indexed keywords

BLOCK LENGTHS; DIFFERENTIABILITY; HMAC; INDIFFERENTIABILITY; LOWER BOUNDS; RANDOM ORACLE; SECRET KEY; STRUCTURAL ISSUES; UPPER BOUND; WEAK KEY;

EID: 84865526160     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32009-5_21     Document Type: Conference Paper
Times cited : (31)

References (35)
  • 1
    • 77958052672 scopus 로고    scopus 로고
    • On the Indifferentiability of the Grøstl Hash Function
    • Garay, J.A., De Prisco, R. (eds.) SCN 2010. Springer, Heidelberg
    • Andreeva, E., Mennink, B., Preneel, B.: On the Indifferentiability of the Grøstl Hash Function. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 88-105. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6280 , pp. 88-105
    • Andreeva, E.1    Mennink, B.2    Preneel, B.3
  • 2
    • 38149094108 scopus 로고    scopus 로고
    • Seven-Property-Preserving Iterated Hashing: ROX
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Andreeva, E., Neven, G., Preneel, B., Shrimpton, T.: Seven-Property- Preserving Iterated Hashing: ROX. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 130-146. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 130-146
    • Andreeva, E.1    Neven, G.2    Preneel, B.3    Shrimpton, T.4
  • 3
    • 33749544409 scopus 로고    scopus 로고
    • New Proofs for NMAC and HMAC: Security Without Collision-Resistance
    • Dwork, C. (ed.) CRYPTO 2006. Springer, Heidelberg
    • Bellare, M.: New Proofs for NMAC and HMAC: Security Without Collision-Resistance. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 602-619. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 602-619
    • Bellare, M.1
  • 4
    • 72449189555 scopus 로고    scopus 로고
    • Hedged Public-Key Encryption: How to Protect against Bad Randomness
    • Matsui, M. (ed.) ASIACRYPT 2009. Springer, Heidelberg
    • Bellare, M., Brakerski, Z., Naor, M., Ristenpart, T., Segev, G., Shacham, H., Yilek, S.: Hedged Public-Key Encryption: How to Protect against Bad Randomness. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 232-249. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5912 , pp. 232-249
    • Bellare, M.1    Brakerski, Z.2    Naor, M.3    Ristenpart, T.4    Segev, G.5    Shacham, H.6    Yilek, S.7
  • 5
    • 35048891868 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
    • Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 6
    • 35248860702 scopus 로고    scopus 로고
    • A Theoretical Treatment of Related-Key Attacks: RKAPRPs, RKA-PRFs, and Applications
    • Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
    • Bellare, M., Kohno, T.: A Theoretical Treatment of Related-Key Attacks: RKAPRPs, RKA-PRFs, and Applications. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 491-506. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 491-506
    • Bellare, M.1    Kohno, T.2
  • 7
    • 77649268663 scopus 로고    scopus 로고
    • Multi-Property-Preserving Hash Domain Extension and the EMD Transform
    • Lai, X., Chen, K. (eds.) ASIACRYPT 2006. Springer, Heidelberg
    • Bellare, M., Ristenpart, T.: Multi-Property-Preserving Hash Domain Extension and the EMD Transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 299-314. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4284 , pp. 299-314
    • Bellare, M.1    Ristenpart, T.2
  • 8
    • 38149004817 scopus 로고    scopus 로고
    • Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
    • Arge, L., Cachin, C., Jurdziński, T., Tarlecki, A. (eds.) ICALP 2007. Springer, Heidelberg
    • Bellare, M., Ristenpart, T.: Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms. In: Arge, L., Cachin, C., Jurdziński, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol. 4596, pp. 399-410. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4596 , pp. 399-410
    • Bellare, M.1    Ristenpart, T.2
  • 9
    • 84865482068 scopus 로고    scopus 로고
    • Multi-Instance Security and Its Application to Password-Based Cryptography
    • Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. Springer, Heidelberg
    • Bellare, M., Ristenpart, T., Tessaro, S.: Multi-Instance Security and Its Application to Password-Based Cryptography. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 312-329. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7417 , pp. 312-329
    • Bellare, M.1    Ristenpart, T.2    Tessaro, S.3
  • 10
    • 33746041431 scopus 로고    scopus 로고
    • The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs
    • Vaudenay, S. (ed.) EUROCRYPT 2006. Springer, Heidelberg
    • Bellare, M., Rogaway, P.: The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 409-426. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 409-426
    • Bellare, M.1    Rogaway, P.2
  • 11
    • 44449147491 scopus 로고    scopus 로고
    • On the Indifferentiability of the Sponge Construction
    • Smart, N.P. (ed.) EUROCRYPT 2008. Springer, Heidelberg
    • Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: On the Indifferentiability of the Sponge Construction. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 181-197. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4965 , pp. 181-197
    • Bertoni, G.1    Daemen, J.2    Peeters, M.3    Van Assche, G.4
  • 12
    • 50249125892 scopus 로고    scopus 로고
    • Improved Indifferentiability Security Analysis of chopMD Hash Function
    • Nyberg, K. (ed.) FSE 2008. Springer, Heidelberg
    • Chang, D., Nandi, M.: Improved Indifferentiability Security Analysis of chopMD Hash Function. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 429-443. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5086 , pp. 429-443
    • Chang, D.1    Nandi, M.2
  • 13
    • 33745119040 scopus 로고    scopus 로고
    • Merkle-Damgård Revisited: How to Construct a Hash Function
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgård Revisited: How to Construct a Hash Function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430-448. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 430-448
    • Coron, J.-S.1    Dodis, Y.2    Malinaud, C.3    Puniya, P.4
  • 14
    • 35048839833 scopus 로고    scopus 로고
    • Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
    • Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
    • Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H., Rabin, T.: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 494-510. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3152 , pp. 494-510
    • Dodis, Y.1    Gennaro, R.2    Håstad, J.3    Krawczyk, H.4    Rabin, T.5
  • 15
    • 70350779943 scopus 로고    scopus 로고
    • Indifferentiability of Permutation- Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6
    • Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
    • Dodis, Y., Reyzin, L., Rivest, R.L., Shen, E.: Indifferentiability of Permutation- Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 104-121. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5665 , pp. 104-121
    • Dodis, Y.1    Reyzin, L.2    Rivest, R.L.3    Shen, E.4
  • 16
    • 67650652323 scopus 로고    scopus 로고
    • Salvaging Merkle-Damgård for Practical Applications
    • Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
    • Dodis, Y., Ristenpart, T., Shrimpton, T.: Salvaging Merkle-Damgård for Practical Applications. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 371-388. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5479 , pp. 371-388
    • Dodis, Y.1    Ristenpart, T.2    Shrimpton, T.3
  • 18
    • 84943235829 scopus 로고
    • Pricing via Processing or Combatting Junk Mail
    • Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
    • Dwork, C., Naor, M.: Pricing via Processing or Combatting Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139-147. Springer, Heidelberg (1993)
    • (1993) LNCS , vol.740 , pp. 139-147
    • Dwork, C.1    Naor, M.2
  • 19
    • 33745136796 scopus 로고    scopus 로고
    • Pebbling and Proofs of Work
    • Shoup, V. (ed.) CRYPTO 2005. Springer, Heidelberg
    • Dwork, C., Naor, M., Wee, H.: Pebbling and Proofs of Work. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 37-54. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3621 , pp. 37-54
    • Dwork, C.1    Naor, M.2    Wee, H.3
  • 23
    • 38149084149 scopus 로고    scopus 로고
    • A Simple Variant of the Merkle-Damg?ard Scheme with a Permutation
    • Kurosawa, K. (ed.) ASIACRYPT 2007. Springer, Heidelberg
    • Hirose, S., Park, J.H., Yun, A.: A Simple Variant of the Merkle-Damg?ard Scheme with a Permutation. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 113-129. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 113-129
    • Hirose, S.1    Park, J.H.2    Yun, A.3
  • 25
    • 78049359365 scopus 로고    scopus 로고
    • Low-Cost Client Puzzles Based on Modular Exponentiation
    • Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. Springer, Heidelberg
    • Karame, G.O., Čapkun, S.: Low-Cost Client Puzzles Based on Modular Exponentiation. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 679-697. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6345 , pp. 679-697
    • Karame, G.O.1    Čapkun, S.2
  • 28
    • 77957013995 scopus 로고    scopus 로고
    • Cryptographic Extraction and Key Derivation: The HKDF Scheme
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Krawczyk, H.: Cryptographic Extraction and Key Derivation: The HKDF Scheme. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 631-648. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 631-648
    • Krawczyk, H.1
  • 29
    • 35048817517 scopus 로고    scopus 로고
    • Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
    • Naor, M. (ed.) TCC 2004. Springer, Heidelberg
    • Maurer, U., Renner, R., Holenstein, C.: Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology. In: Naor, M. (ed.) TCC 2004. LNCS, vol. 2951, pp. 21-39. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.2951 , pp. 21-39
    • Maurer, U.1    Renner, R.2    Holenstein, C.3
  • 31
    • 79958012441 scopus 로고    scopus 로고
    • Careful with Composition: Limitations of the Indifferentiability Framework
    • Paterson, K.G. (ed.) EUROCRYPT 2011. Springer, Heidelberg
    • Ristenpart, T., Shacham, H., Shrimpton, T.: Careful with Composition: Limitations of the Indifferentiability Framework. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 487-506. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6632 , pp. 487-506
    • Ristenpart, T.1    Shacham, H.2    Shrimpton, T.3
  • 32
    • 85175129914 scopus 로고    scopus 로고
    • When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography
    • ISOC
    • Ristenpart, T., Yilek, S.: When good randomness goes bad: Virtual machine reset vulnerabilities and hedging deployed cryptography. In: Network and Distributed Systems Security- NDSS 2010. ISOC (2010)
    • (2010) Network and Distributed Systems Security- NDSS 2010
    • Ristenpart, T.1    Yilek, S.2
  • 33
    • 79951798566 scopus 로고    scopus 로고
    • Stronger Difficulty Notions for Client Puzzles and Denial-of-Service- Resistant Protocols
    • Kiayias, A. (ed.) CT-RSA 2011. Springer, Heidelberg
    • Stebila, D., Kuppusamy, L., Rangasamy, J., Boyd, C., Gonzalez Nieto, J.: Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant Protocols. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 284-301. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6558 , pp. 284-301
    • Stebila, D.1    Kuppusamy, L.2    Rangasamy, J.3    Boyd, C.4    Gonzalez Nieto, J.5
  • 34
    • 0026973508 scopus 로고
    • Message authentication with one-way hash functions
    • IEEE
    • Tsudik, G.: Message authentication with one-way hash functions. In: Proceedings IEEE INFOCOM 1992, vol. 3, pp. 2055-2059. IEEE (1992)
    • (1992) Proceedings IEEE INFOCOM 1992 , vol.3 , pp. 2055-2059
    • Tsudik, G.1
  • 35
    • 0038825046 scopus 로고    scopus 로고
    • Defending against denial-of-service attacks with puzzle auction
    • Wang, X.F., Reiter, M.K.: Defending against denial-of-service attacks with puzzle auction. In: IEEE Symposium on Security and Privacy, pp. 78-92 (2003)
    • (2003) IEEE Symposium on Security and Privacy , pp. 78-92
    • Wang, X.F.1    Reiter, M.K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.