Security analysis of the mode of JH hash function
From MaRDI portal
Publication:3577958
Recommendations
Cited in
(14)- Towards Understanding the Known-Key Security of Block Ciphers
- Improved indifferentiability security bound for the JH mode
- Crooked indifferentiability of enveloped XOR revisited
- Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier
- Building indifferentiable compression functions from the PGV compression functions
- Full indifferentiable security of the XOR of two or more random permutations using the \(\chi^2\) method
- On the indifferentiability of Fugue and Luffa
- Discrete-time interacting quantum walks and quantum hash schemes
- Security analysis of Even-Mansour structure hash functions
- Open problems in hash function security
- A novel permutation-based hash mode of operation \texttt{FP} and the hash function \texttt{SAMOSA}
- Rebound attack on reduced-round versions of JH
- Rebound attack on JH42
- MJH: a faster alternative to MDC-2
This page was built for publication: Security analysis of the mode of JH hash function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3577958)