Security Analysis of the Mode of JH Hash Function
From MaRDI portal
Publication:3577958
DOI10.1007/978-3-642-13858-4_10zbMath1279.94132OpenAlexW1843429063MaRDI QIDQ3577958
Rishiraj Bhattacharyya, Mridul Nandi, Avradip Mandal
Publication date: 13 July 2010
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13858-4_10
Related Items (10)
Improved indifferentiability security bound for the JH mode ⋮ Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier ⋮ Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method ⋮ Discrete-time interacting quantum walks and quantum hash schemes ⋮ Towards Understanding the Known-Key Security of Block Ciphers ⋮ Open problems in hash function security ⋮ Crooked indifferentiability of enveloped XOR revisited ⋮ On the Indifferentiability of Fugue and Luffa ⋮ Building indifferentiable compression functions from the PGV compression functions ⋮ MJH: A Faster Alternative to MDC-2
This page was built for publication: Security Analysis of the Mode of JH Hash Function