Some Plausible Constructions of Double-Block-Length Hash Functions
From MaRDI portal
Publication:3618655
DOI10.1007/11799313_14zbMATH Open1234.94046OpenAlexW1547189451MaRDI QIDQ3618655FDOQ3618655
Publication date: 2 April 2009
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11799313_14
Recommendations
Cited In (39)
- Salvaging Merkle-Damgård for Practical Applications
- On the Weak Ideal Compression Functions
- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function
- Collision Resistant Double-Length Hashing
- Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
- A New Double-Block-Length Hash Function Using Feistel Structure
- Security of permutation-based compression function {\textsf{lp}}231
- Towards Understanding the Known-Key Security of Block Ciphers
- Indifferentiability of double-block-length hash function without feed-forward operations
- Towards Optimal Double-Length Hash Functions
- LHash: A Lightweight Hash Function
- Cryptanalysis of Grindahl
- Cryptography and Coding
- MJH: A Faster Alternative to MDC-2
- Title not available (Why is that?)
- Indifferentiability of the confusion-diffusion network and the cascade block cipher
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption
- A note on quantum collision resistance of double-block-length compression functions
- On the collision and preimage security of MDC-4 in the ideal cipher model
- Some Attacks Against a Double Length Hash Proposal
- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions
- Cryptanalysis of MDC-2
- Double-block-length hash function for minimum memory size
- On the security of triplex- and multiplex-type constructions with smaller tweaks
- Fast Software Encryption
- Attacks on a double length blockcipher-based hash proposal
- Efficient leakage-resilient MACs without idealized assumptions
- Preimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\)
- Collision attack on \({\mathtt Grindahl}\)
- A synthetic indifferentiability analysis of some block-cipher-based hash functions
- The security of tandem-DM in the ideal cipher model
- Open problems in hash function security
- Hash Functions and RFID Tags: Mind the Gap
- MJH: a faster alternative to MDC-2
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- On the Security of Hash Functions Employing Blockcipher Postprocessing
- Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles
- Attacks on fast double block length hash functions
- Optimal collision security in double block length hashing with single length key
This page was built for publication: Some Plausible Constructions of Double-Block-Length Hash Functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3618655)