Building indifferentiable compression functions from the PGV compression functions
From MaRDI portal
Publication:5963372
DOI10.1007/S10623-014-0020-ZzbMATH Open1355.94056OpenAlexW2012903828WikidataQ56933127 ScholiaQ56933127MaRDI QIDQ5963372FDOQ5963372
Authors: Praveen Gauravaram, Nasour Bagheri, Lars R. Knudsen
Publication date: 19 February 2016
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-014-0020-z
Recommendations
- Indifferentiability of double length compression functions
- Ideal-cipher (ir)reducibility for blockcipher-based hash functions
- A synthetic indifferentiability analysis of some block-cipher-based hash functions
- An analysis of the blockcipher-based hash functions from PGV
- On the Weak Ideal Compression Functions
Cites Work
- Careful with composition: limitations of the indifferentiability framework
- Title not available (Why is that?)
- Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6
- Title not available (Why is that?)
- Merkle-Damgård Revisited: How to Construct a Hash Function
- On the Indifferentiability of the Sponge Construction
- Theory of Cryptography
- Security analysis of randomize-hash-then-sign digital signatures
- Security analysis of the mode of JH hash function
- On the indifferentiability of the Grøstl hash function
- On Randomizing Hash Functions to Strengthen the Security of Digital Signatures
- Advances in Cryptology – CRYPTO 2004
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- Linear-XOR and Additive Checksums Don’t Protect Damgård-Merkle Hashes from Generic Attacks
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- A Simple Variant of the Merkle-Damgård Scheme with a Permutation
- A Failure-Friendly Design Principle for Hash Functions
- Salvaging Merkle-Damgård for Practical Applications
- A synthetic indifferentiability analysis of some block-cipher-based hash functions
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding
- Blockcipher-Based Hashing Revisited
- An analysis of the blockcipher-based hash functions from PGV
- Title not available (Why is that?)
- Collisions and Near-Collisions for Reduced-Round Tiger
Cited In (5)
Uses Software
This page was built for publication: Building indifferentiable compression functions from the PGV compression functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5963372)