Improved indifferentiability security bound for the JH mode
From MaRDI portal
Publication:285241
DOI10.1007/s10623-015-0047-9zbMath1405.94076OpenAlexW2074491649MaRDI QIDQ285241
Souradyuti Paul, Dustin Moody, Daniel Smith-Tone
Publication date: 19 May 2016
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-015-0047-9
Analysis of algorithms and problem complexity (68Q25) Analysis of algorithms (68W40) Cryptography (94A60)
Related Items (5)
Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier ⋮ Open problems in hash function security ⋮ A measure of dependence for cryptographic primitives relative to ideal functions ⋮ Crooked indifferentiability of enveloped XOR revisited ⋮ Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff
Cites Work
- A measure of dependence for cryptographic primitives relative to ideal functions
- Security analysis of randomize-hash-then-sign digital signatures
- Careful with Composition: Limitations of the Indifferentiability Framework
- Security Reductions of the Second Round SHA-3 Candidates
- Some Observations on Indifferentiability
- Provable Security of BLAKE with Non-ideal Compression Function
- Multicollision Attacks on Some Generalized Sequential Hash Functions
- Security Analysis of the Mode of JH Hash Function
- On the Indifferentiability of the Grøstl Hash Function
- Herding Hash Functions and the Nostradamus Attack
- Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures
- Collision Resistance of the JH Hash Function
- Advances in Cryptology – CRYPTO 2004
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Second Preimage Attacks on Dithered Hash Functions
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- Strengthening Digital Signatures Via Randomized Hashing
- Theory of Cryptography
- Building indifferentiable compression functions from the PGV compression functions
This page was built for publication: Improved indifferentiability security bound for the JH mode