Abstract. This article discusses the provable security of an iterated hash function using a block cipher. It assumes the construction using the Matyas-Meyer-Oseas (MMO) scheme for the compression function and the Merkle-Damg̊ard with a permutation (MDP) for the domain extension transform. It is shown that this kind of hash function, MDP-MMO, is indifferentiable from the variable-input-length random oracle in the ideal cipher model. It is also shown that HMAC using MDP-MMO is a pseudorandom function if the underlying block cipher is a pseudorandom permutation under the related-key attack with respect to the permutation used in MDP. Actually, the latter result also assumes that the following function is a pseudorandom bit generator: (EIV (K ⊕...
© 2015, Springer Science+Business Media New York. A cryptographic hash function compresses arbitrari...
Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the...
Abstract. We consider the security of compression functions built by combin-ing smaller perfectly se...
This article discusses the provable security of an iterated hash function using a block cipher. It a...
Abstract. The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compress...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
© Springer-Verlag Berlin Heidelberg 1994. Constructions for hash functions baaed on a block cipher a...
We propose a new composition scheme for hash functions. It is a variant of the Merkle-Damg??ard cons...
We propose a new composition scheme for hash functions. It is a variant of the Merkle-DamgAyenrd con...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
HMAC is a widely used message authentication code and a pseudorandom function generator based on cry...
Abstract. This paper eviews constructions of hash functions and MAC algorithms based on block cipher...
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals...
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals...
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It dis...
© 2015, Springer Science+Business Media New York. A cryptographic hash function compresses arbitrari...
Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the...
Abstract. We consider the security of compression functions built by combin-ing smaller perfectly se...
This article discusses the provable security of an iterated hash function using a block cipher. It a...
Abstract. The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compress...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
© Springer-Verlag Berlin Heidelberg 1994. Constructions for hash functions baaed on a block cipher a...
We propose a new composition scheme for hash functions. It is a variant of the Merkle-Damg??ard cons...
We propose a new composition scheme for hash functions. It is a variant of the Merkle-DamgAyenrd con...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
HMAC is a widely used message authentication code and a pseudorandom function generator based on cry...
Abstract. This paper eviews constructions of hash functions and MAC algorithms based on block cipher...
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals...
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals...
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It dis...
© 2015, Springer Science+Business Media New York. A cryptographic hash function compresses arbitrari...
Halevi and Krawczyk proposed a message randomization algorithm called RMX as a front-end tool to the...
Abstract. We consider the security of compression functions built by combin-ing smaller perfectly se...