This article presents a sequential domain extension scheme with minimum padding for hashing using a compression function. The proposed domain extension scheme is free from the length extension property. The collision resistance of a hash function using the proposed domain extension is shown to be reduced to the collision resistance and the everywhere preimage resistance of the underlying compression function in the standard model, where the compression function is assumed to be chosen at random from a function family in some efficient way. Its indifferentiability from a random oracle up to the birthday bound is also shown on the assumption that the underlying compression function is a fixed-input-length random oracle or the Davies-Meyer mod...
AbstractWe study the problem of securely extending the domain of a collision resistant compression f...
This paper proposes a new hash construction based on the widely used Merkle-Damgård (MD) iteration [...
Many cryptographic applications of hash functions are analyzed in the random oracle model. Unfortuna...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
© 2015, Springer-Verlag Berlin Heidelberg. A well-established method of constructing hash functions...
A public random function R: {0, 1}m → {0, 1}n is a function chosen uniformly at random from the set ...
AbstractWe study the problem of securely extending the domain of a collision resistant compression f...
Abstract. The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compress...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Abstract. In this paper, we introduce new hash function design principles with variable output lengt...
In this paper we propose a new sequential mode of operation – the Fast wide pipe or FWP for short – ...
AbstractWe study the problem of securely extending the domain of a collision resistant compression f...
This paper proposes a new hash construction based on the widely used Merkle-Damgård (MD) iteration [...
Many cryptographic applications of hash functions are analyzed in the random oracle model. Unfortuna...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
© 2015, Springer-Verlag Berlin Heidelberg. A well-established method of constructing hash functions...
A public random function R: {0, 1}m → {0, 1}n is a function chosen uniformly at random from the set ...
AbstractWe study the problem of securely extending the domain of a collision resistant compression f...
Abstract. The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compress...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Abstract. In this paper, we introduce new hash function design principles with variable output lengt...
In this paper we propose a new sequential mode of operation – the Fast wide pipe or FWP for short – ...
AbstractWe study the problem of securely extending the domain of a collision resistant compression f...
This paper proposes a new hash construction based on the widely used Merkle-Damgård (MD) iteration [...
Many cryptographic applications of hash functions are analyzed in the random oracle model. Unfortuna...