Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions
From MaRDI portal
Publication:3600231
DOI10.1007/978-3-540-85174-5_22zbMath1183.68279OpenAlexW2147436724MaRDI QIDQ3600231
Publication date: 10 February 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85174-5_22
Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30) Authentication, digital signatures and secret sharing (94A62)
Related Items (12)
Parallel Hashing via List Recoverability ⋮ The security of tandem-DM in the ideal cipher model ⋮ An analysis of the blockcipher-based hash functions from PGV ⋮ Open problems in hash function security ⋮ Revisiting the indifferentiability of the sum of permutations ⋮ Security of permutation-based compression function {\textsf{lp}}231 ⋮ MJH: a faster alternative to MDC-2 ⋮ Optimal collision security in double block length hashing with single length key ⋮ Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers ⋮ MJH: A Faster Alternative to MDC-2 ⋮ Compactness of hashing modes and efficiency beyond Merkle tree ⋮ Preimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Building a Collision-Resistant Compression Function from Non-compressing Primitives
- Security Analysis of Constructions Combining FIL Random Oracles
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- Domain Extension of Public Random Functions: Beyond the Birthday Barrier
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Advances in Cryptology - EUROCRYPT 2004
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- The Collision Intractability of MDC-2 in the Ideal-Cipher Model
- Some Attacks Against a Double Length Hash Proposal
- Security/Efficiency Tradeoffs for Permutation-Based Hashing
- Combining Compression Functions and Block Cipher-Based Hash Functions
- Fast Software Encryption
This page was built for publication: Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions