Security analysis of the mode of JH hash function
From MaRDI portal
Publication:3577958
DOI10.1007/978-3-642-13858-4_10zbMATH Open1279.94132OpenAlexW1843429063MaRDI QIDQ3577958FDOQ3577958
Authors: Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi
Publication date: 13 July 2010
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13858-4_10
Recommendations
Cited In (14)
- Towards Understanding the Known-Key Security of Block Ciphers
- Improved indifferentiability security bound for the JH mode
- Crooked indifferentiability of enveloped XOR revisited
- Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier
- Building indifferentiable compression functions from the PGV compression functions
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
- On the indifferentiability of Fugue and Luffa
- Discrete-time interacting quantum walks and quantum hash schemes
- Security analysis of Even-Mansour structure hash functions
- Open problems in hash function security
- A novel permutation-based hash mode of operation \texttt{FP} and the hash function \texttt{SAMOSA}
- Rebound attack on reduced-round versions of JH
- Rebound attack on JH42
- MJH: a faster alternative to MDC-2
This page was built for publication: Security analysis of the mode of JH hash function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3577958)