Some Plausible Constructions of Double-Block-Length Hash Functions

From MaRDI portal
Revision as of 05:33, 5 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3618655


DOI10.1007/11799313_14zbMath1234.94046MaRDI QIDQ3618655

Shouichi Hirose

Publication date: 2 April 2009

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11799313_14


94A60: Cryptography


Related Items

Collision Resistant Double-Length Hashing, Hash Functions and RFID Tags: Mind the Gap, Indifferentiability of the confusion-diffusion network and the cascade block cipher, Efficient leakage-resilient MACs without idealized assumptions, Double-block-length hash function for minimum memory size, MJH: a faster alternative to MDC-2, Optimal collision security in double block length hashing with single length key, Preimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\), Open problems in hash function security, Attacks on a double length blockcipher-based hash proposal, Collision attack on \({\mathtt Grindahl}\), A synthetic indifferentiability analysis of some block-cipher-based hash functions, Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions, \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption, A note on quantum collision resistance of double-block-length compression functions, The security of tandem-DM in the ideal cipher model, Security of permutation-based compression function {\textsf{lp}}231, On the collision and preimage security of MDC-4 in the ideal cipher model, Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles, Towards Understanding the Known-Key Security of Block Ciphers, On the Security of Hash Functions Employing Blockcipher Postprocessing, MJH: A Faster Alternative to MDC-2, LHash: A Lightweight Hash Function, Cryptanalysis of Grindahl, Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions, Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers, Cryptanalysis of MDC-2, Salvaging Merkle-Damgård for Practical Applications, A New Double-Block-Length Hash Function Using Feistel Structure