Some Plausible Constructions of Double-Block-Length Hash Functions
From MaRDI portal
Publication:3618655
Recommendations
Cited in
(43)- Optimal collision security in double block length hashing with single length key
- Salvaging Merkle-Damgård for Practical Applications
- On the Weak Ideal Compression Functions
- A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function
- Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
- A New Double-Block-Length Hash Function Using Feistel Structure
- Security of permutation-based compression function {\textsf{lp}}231
- Towards Understanding the Known-Key Security of Block Ciphers
- Indifferentiability of double length compression functions
- Indifferentiability of double-block-length hash function without feed-forward operations
- Counter-\(b\)DM: a provably secure family of multi-block-length compression functions
- Towards Optimal Double-Length Hash Functions
- Cryptanalysis of Grindahl
- Cryptography and Coding
- scientific article; zbMATH DE number 1088934 (Why is no real title available?)
- Indifferentiability of the confusion-diffusion network and the cascade block cipher
- \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption
- A note on quantum collision resistance of double-block-length compression functions
- On the collision and preimage security of MDC-4 in the ideal cipher model
- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions
- Cryptanalysis of MDC-2
- Some Attacks Against a Double Length Hash Proposal
- Double-block-length hash function for minimum memory size
- Collision resistant double-length hashing
- On the security of triplex- and multiplex-type constructions with smaller tweaks
- Attacks on a double length blockcipher-based hash proposal
- Fast Software Encryption
- Preimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\)
- Collision attack on \({\mathtt Grindahl}\)
- Efficient leakage-resilient MACs without idealized assumptions
- A synthetic indifferentiability analysis of some block-cipher-based hash functions
- The security of tandem-DM in the ideal cipher model
- Blockcipher-based double-length hash functions for pseudorandom oracles
- Open problems in hash function security
- MJH: a faster alternative to MDC-2
- MJH: a faster alternative to MDC-2
- Hash Functions and RFID Tags: Mind the Gap
- Ideal-cipher (ir)reducibility for blockcipher-based hash functions
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- On the Security of Hash Functions Employing Blockcipher Postprocessing
- LHash: a lightweight hash function
- Optimal collision security in double block length hashing with single length key
- Attacks on fast double block length hash functions
This page was built for publication: Some Plausible Constructions of Double-Block-Length Hash Functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3618655)