MJH: A Faster Alternative to MDC-2
From MaRDI portal
Publication:3073709
DOI10.1007/978-3-642-19074-2_15zbMATH Open1284.94087OpenAlexW1524358972MaRDI QIDQ3073709FDOQ3073709
Publication date: 11 February 2011
Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19074-2_15
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- Security/Efficiency Tradeoffs for Permutation-Based Hashing
- Security Analysis of the Mode of JH Hash Function
- Finding Collisions in the Full SHA-1
- MD4 is Not One-Way
- Preimages for Reduced SHA-0 and SHA-1
- Finding Preimages in Full MD5 Faster Than Exhaustive Search
- Cryptanalysis of the Hash Functions MD4 and RIPEMD
- How to Break MD5 and Other Hash Functions
- Collisions of SHA-0 and Reduced SHA-1
- Multi-property-preserving Domain Extension Using Polynomial-Based Modes of Operation
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Attacks on fast double block length hash functions
- Blockcipher-Based Hashing Revisited
- On the Security of Tandem-DM
- Building a Collision-Resistant Compression Function from Non-compressing Primitives
- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Cryptanalysis of MDC-2
- Security of Cyclic Double Block Length Hash Functions
- Another Glance at Double-Length Hashing
- How to Build a Hash Function from Any Collision-Resistant Function
- Cryptography and Coding
- The Collision Intractability of MDC-2 in the Ideal-Cipher Model
- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
- Hash Functions and RFID Tags: Mind the Gap
- Analysis of Step-Reduced SHA-256
- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition
Cited In (6)
- Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
- Double-block-length hash function for minimum memory size
- Open problems in hash function security
- MJH: a faster alternative to MDC-2
- Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles
- Optimal collision security in double block length hashing with single length key
This page was built for publication: MJH: A Faster Alternative to MDC-2
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073709)