Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of strengthening, Merkle trees, and sponge functions. As underlying primitives, these functions use arbitrary functions, permutations, or block ciphers. In this work we provide three simple proofs, one per primitive type, that cover all modes where the input to the primitive consists of message bits, chaining value bits, and bits that only depend on the mode and message length. Our approach generalizes and simplifies over earlier attempts of Dodis et al. (FSE 2009) and Bertoni et al. (Int. J. Inf. Sec. 2014). We prove tight indifferentiability bounds for modes using each of these three primitive types provided that the mode satisfies some easy to v...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
This paper determines an exact relationship between collision-free hash functions and other cryptogr...
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of str...
In the recent years, several hash constructions have been introduced that aim at achieving enhanced ...
Contains fulltext : 200785.pdf (publisher's version ) (Open Access
We consider the general case of tree hashing modes that make use of an underlying compression functi...
We propose a new composition scheme for hash functions. It is a variant of the Merkle-Damg??ard cons...
We propose a new composition scheme for hash functions. It is a variant of the Merkle-DamgAyenrd con...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
Abstract. The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compress...
The notion of indifferentiability, which is a stronger version of the classic notion of indistinguis...
Indifferentiability security of a hash mode of operation guarantees the mode's resistance against al...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
This paper determines an exact relationship between collision-free hash functions and other cryptogr...
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of str...
In the recent years, several hash constructions have been introduced that aim at achieving enhanced ...
Contains fulltext : 200785.pdf (publisher's version ) (Open Access
We consider the general case of tree hashing modes that make use of an underlying compression functi...
We propose a new composition scheme for hash functions. It is a variant of the Merkle-Damg??ard cons...
We propose a new composition scheme for hash functions. It is a variant of the Merkle-DamgAyenrd con...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
Abstract. The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compress...
The notion of indifferentiability, which is a stronger version of the classic notion of indistinguis...
Indifferentiability security of a hash mode of operation guarantees the mode's resistance against al...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
This paper determines an exact relationship between collision-free hash functions and other cryptogr...