A Failure-Friendly Design Principle for Hash Functions
From MaRDI portal
Publication:5451086
DOI10.1007/11593447_26zbMath1154.94414OpenAlexW1754628477MaRDI QIDQ5451086
Publication date: 18 March 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11593447_26
Related Items
Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier ⋮ New second-preimage attacks on hash functions ⋮ Security analysis of randomize-hash-then-sign digital signatures ⋮ Collisions for Round-Reduced LAKE ⋮ A simple variant of the Merkle-Damgård scheme with a permutation ⋮ On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak ⋮ The Hash Function Family LAKE ⋮ A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier ⋮ Collisions for RC4-Hash ⋮ Boosting Merkle-Damgård Hashing for Message Authentication ⋮ Simple hash function using discrete-time quantum walks ⋮ Optimal collision security in double block length hashing with single length key ⋮ Fast correlation attack on stream cipher ABC v3 ⋮ Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers ⋮ Slide Attacks on a Class of Hash Functions ⋮ How to Fill Up Merkle-Damgård Hash Functions ⋮ Hash Functions from Defective Ideal Ciphers ⋮ Building indifferentiable compression functions from the PGV compression functions ⋮ Multilane HMAC— Security beyond the Birthday Limit ⋮ Extended Multi-Property-Preserving and ECM-Construction ⋮ Security/Efficiency Tradeoffs for Permutation-Based Hashing ⋮ A synthetic indifferentiability analysis of some block-cipher-based hash functions ⋮ On Randomizing Hash Functions to Strengthen the Security of Digital Signatures ⋮ Cryptanalysis of MDC-2 ⋮ A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier ⋮ One-Key Compression Function Based MAC with Security Beyond Birthday Bound ⋮ Hash function requirements for Schnorr signatures ⋮ Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n ⋮ Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL ⋮ Boomerang Distinguisher for the SIMD-512 Compression Function ⋮ Hash function based on quantum walks ⋮ How to Use Merkle-Damgård — On the Security Relations between Signature Schemes and Their Inner Hash Functions