메뉴 건너뛰기




Volumn 7021, Issue , 2007, Pages

A Collision-Resistant Rate-1 Double-Block-Length Hash Function

Author keywords

[No Author keywords available]

Indexed keywords

CONSTRUCTION;

EID: 84871603203     PISSN: 18624405     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (19)

References (29)
  • 1
    • 85175030807 scopus 로고    scopus 로고
    • The polyl305-AES message-authentication code
    • D. Bernstein. The polyl305-AES message-authentication code. FSE 2005.
    • (2005) FSE
    • Bernstein, D.1
  • 2
    • 85175059489 scopus 로고    scopus 로고
    • Multi-property-preserving hash domain extension: The EMD transform
    • M. Bellare, T. Ristenpart. Multi-property-preserving hash domain extension: The EMD transform. Asiacrypt 2006.
    • (2006) Asiacrypt
    • Bellare, M.1    Ristenpart, T.2
  • 5
    • 84883697863 scopus 로고    scopus 로고
    • Black-box analysis of the block-cipher based hash-function construction from PGV
    • Crypto 02
    • J. Black, P. Rogaway, T. Shrimpton. Black-box analysis of the block-cipher based hash-function construction from PGV. Crypto 02.
    • Black, J.1    Rogaway, P.2    Shrimpton, T.3
  • 6
    • 85175060736 scopus 로고    scopus 로고
    • The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function
    • J. Black. The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function. FSE 2006.
    • (2006) FSE
    • Black, J.1
  • 8
    • 33646778026 scopus 로고    scopus 로고
    • Merkle-Damgård revisited: how to construct a hash function
    • J. Coron, Y. Dodis, C. Malinaud, P. Punyia. Merkle-Damgård revisited: how to construct a hash function. Crypto 2005.
    • (2005) Crypto
    • Coron, J.1    Dodis, Y.2    Malinaud, C.3    Punyia, P.4
  • 9
    • 0001744332 scopus 로고    scopus 로고
    • A design principle for hash functions
    • I. Damgård. A design principle for hash functions. Crypto 89.
    • Crypto , vol.89
    • Damgård, I.1
  • 10
    • 85175013895 scopus 로고    scopus 로고
    • Square hash: fast message authentication via optimized universal hash functions
    • M. Etzel, S. Patel, Z. Ramzan. Square hash: fast message authentication via optimized universal hash functions. Crypto’99.
    • Crypto’99
    • Etzel, M.1    Patel, S.2    Ramzan, Z.3
  • 11
    • 33750056864 scopus 로고    scopus 로고
    • Some Plausible Constructions of Double-Block-Length Hash Functions
    • S. Hirose. Some Plausible Constructions of Double-Block-Length Hash Functions. FSE 2006.
    • (2006) FSE
    • Hirose, S.1
  • 12
    • 24944577209 scopus 로고    scopus 로고
    • Multicollisions in iterated hash functions, application to cascaded constructions
    • Crypto 04
    • A. Joux. Multicollisions in iterated hash functions, application to cascaded constructions. Crypto 04.
    • Joux, A.1
  • 13
    • 38149097194 scopus 로고    scopus 로고
    • Herding Hash Functions and the Nostradamus Attack
    • J. Kelsey, T. Kohno. Herding Hash Functions and the Nostradamus Attack. Eurocrypt 2006.
    • (2006) Eurocrypt
    • Kelsey, J.1    Kohno, T.2
  • 15
    • 84862469656 scopus 로고    scopus 로고
    • CWC: a high performance conventional authenticared encryption mode
    • FSE 04
    • T. Kohno, J. Viega, D. Whiting. CWC: a high performance conventional authenticared encryption mode. FSE 04.
    • Kohno, T.1    Viega, J.2    Whiting, D.3
  • 16
    • 85175029826 scopus 로고    scopus 로고
    • Constructing an Ideal Hash Function from Weak Ideal Compression Functions
    • M. Liskov. Constructing an Ideal Hash Function from Weak Ideal Compression Functions. SAC 2006.
    • (2006) SAC
    • Liskov, M.1
  • 17
    • 63749125877 scopus 로고    scopus 로고
    • A Failure-Friendly Design Principle for Hash Functions
    • S. Lucks. A Failure-Friendly Design Principle for Hash Functions. Asiacrypt 2005.
    • (2005) Asiacrypt
    • Lucks, S.1
  • 18
    • 0005663765 scopus 로고    scopus 로고
    • Faster Luby-Rackoff Ciphers
    • S. Lucks. Faster Luby-Rackoff Ciphers. FSE 1996.
    • (1996) FSE
    • Lucks, S.1
  • 20
    • 0000966673 scopus 로고    scopus 로고
    • One-way hash functions and DES
    • R. Merkle. One-way hash functions and DES. Crypto 89.
    • Crypto , vol.89
    • Merkle, R.1
  • 21
    • 0003064824 scopus 로고    scopus 로고
    • On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited
    • M. Naor, O. Reingold. On the Construction of Pseudorandom Permutations: Luby-Rackoff Revisited. J. Cryptology 12(1) 29-66 (1999).
    • (1999) J. Cryptology , vol.12 , Issue.1 , pp. 29-66
    • Naor, M.1    Reingold, O.2
  • 22
    • 85175069793 scopus 로고    scopus 로고
    • Hash functions based on block ciphers: A syntetic approach
    • B. Preneel, R. Govaerts, R. Vanderwalle. Hash functions based on block ciphers: A syntetic approach. Crypto 93.
    • Crypto , vol.93
    • Preneel, B.1    Govaerts, R.2    Vanderwalle, R.3
  • 24
    • 27644501857 scopus 로고    scopus 로고
    • Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision-Resistance
    • P. Rogaway and T. Shrimpton. Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision-Resistance. FSE 2004.
    • (2004) FSE
    • Rogaway, P.1    Shrimpton, T.2
  • 25
    • 33745152524 scopus 로고    scopus 로고
    • Cryptoanalyisis of the hash functions MD4 and RIPEMD
    • X. Wang, X. Lai, D. Feng, H. Cheng, X. Yu. Cryptoanalyisis of the hash functions MD4 and RIPEMD. Eurocrypt 2005.
    • (2005) Eurocrypt
    • Wang, X.1    Lai, X.2    Feng, D.3    Cheng, H.4    Yu, X.5
  • 26
    • 33745179728 scopus 로고    scopus 로고
    • How to break MD5 and other hash functions
    • X. Wang, H. Yu. How to break MD5 and other hash functions. Eurocrypt 2005.
    • (2005) Eurocrypt
    • Wang, X.1    Yu, H.2
  • 27
    • 33745179728 scopus 로고    scopus 로고
    • Efficient collision search attacks on SHA0
    • X. Wang, H. Yu, Y. L. Yin. Efficient collision search attacks on SHA0. Crypto 2005.
    • (2005) Crypto
    • Wang, X.1    Yu, H.2    Yin, Y. L.3
  • 28
    • 33646754186 scopus 로고    scopus 로고
    • Finding collisions in the full SHA1
    • X. Wang, Y. L. Yin, H. Yu. Finding collisions in the full SHA1. Crypto 2005.
    • (2005) Crypto
    • Wang, X.1    Yin, Y. L.2    Yu, H.3
  • 29
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. Wegman, J. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, Vol. 22, 1981, 265–279.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.1    Carter, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.