MJH: a faster alternative to MDC-2
From MaRDI portal
Publication:498970
DOI10.1007/s10623-014-9936-6zbMath1397.94084OpenAlexW2780355623MaRDI QIDQ498970
Publication date: 29 September 2015
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-014-9936-6
Related Items
Optimal collision security in double block length hashing with single length key, Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Attacks on fast double block length hash functions
- MJH: A Faster Alternative to MDC-2
- Efficient Hashing Using the AES Instruction Set
- Blockcipher-Based Hashing Revisited
- On the Security of Tandem-DM
- Building a Collision-Resistant Compression Function from Non-compressing Primitives
- Multi-property-preserving Domain Extension Using Polynomial-Based Modes of Operation
- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Cryptanalysis of MDC-2
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Security of Cyclic Double Block Length Hash Functions
- Another Glance at Double-Length Hashing
- The Collision Security of Tandem-DM in the Ideal Cipher Model
- Collision Resistance of the JH Hash Function
- On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions
- How to Build a Hash Function from Any Collision-Resistant Function
- Cryptography and Coding
- The Collision Intractability of MDC-2 in the Ideal-Cipher Model
- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
- Security/Efficiency Tradeoffs for Permutation-Based Hashing
- Hash Functions and RFID Tags: Mind the Gap
- One Way Hash Functions and DES