The security of tandem-DM in the ideal cipher model
From MaRDI portal
Publication:2397447
Recommendations
Cites work
- scientific article; zbMATH DE number 1583800 (Why is no real title available?)
- scientific article; zbMATH DE number 503327 (Why is no real title available?)
- scientific article; zbMATH DE number 1500485 (Why is no real title available?)
- Another glance at double-length hashing
- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions
- Blockcipher-Based Hashing Revisited
- Building a Collision-Resistant Compression Function from Non-compressing Primitives
- Collision resistant double-length hashing
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- Fast Software Encryption
- Message Authentication Codes from Unpredictable Block Ciphers
- Multi-property-preserving domain extension using polynomial-based modes of operation
- On the Security of Tandem-DM
- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
- Security of cyclic double block length hash functions
- Some Plausible Constructions of Double-Block-Length Hash Functions
- The Collision Intractability of MDC-2 in the Ideal-Cipher Model
- The collision security of Tandem-DM in the ideal cipher model
- The preimage security of double-block-length compression functions
Cited in
(6)- On the Security of Tandem-DM
- The collision security of Tandem-DM in the ideal cipher model
- On the (in)security of IDEA in various hashing modes
- Weimar-DM: a highly secure double-length compression function
- On the collision and preimage security of MDC-4 in the ideal cipher model
- The preimage security of double-block-length compression functions
This page was built for publication: The security of tandem-DM in the ideal cipher model
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2397447)