Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier
From MaRDI portal
(Redirected from Publication:293718)
Recommendations
- Speeding up the wide-pipe: secure and fast hashing
- Improved indifferentiability security bound for the JH mode
- Improved Indifferentiability Security Analysis of chopMD Hash Function
- Improved indifferentiability security bound for the prefix-free Merkle-Damgård hash function
- A Failure-Friendly Design Principle for Hash Functions
Cites work
- scientific article; zbMATH DE number 4195165 (Why is no real title available?)
- scientific article; zbMATH DE number 2086712 (Why is no real title available?)
- scientific article; zbMATH DE number 1842495 (Why is no real title available?)
- A Failure-Friendly Design Principle for Hash Functions
- A Simple Variant of the Merkle-Damgård Scheme with a Permutation
- A measure of dependence for cryptographic primitives relative to ideal functions
- Advances in Cryptology – CRYPTO 2004
- Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
- Careful with composition: limitations of the indifferentiability framework
- Herding Hash Functions and the Nostradamus Attack
- Improved Indifferentiability Security Analysis of chopMD Hash Function
- Improved indifferentiability security bound for the JH mode
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- Multicollision Attacks on Some Generalized Sequential Hash Functions
- On the Indifferentiability of the Sponge Construction
- On the Security of Hash Functions Employing Blockcipher Postprocessing
- On the complexity of the herding attack and some related attacks on hash functions
- On the indifferentiability of the Grøstl hash function
- One Way Hash Functions and DES
- Provable Security of BLAKE with Non-ideal Compression Function
- Second Preimage Attacks on Dithered Hash Functions
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Security analysis of the mode of JH hash function
- Some observations on indifferentiability
- Speeding up the wide-pipe: secure and fast hashing
- Techniques for cryptanalysis of block ciphers. (to appear)
- Theory of Cryptography
Cited in
(4)
This page was built for publication: Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q293718)