Preneel, Govaerts, and Vandewalle [7] considered the 64 most basic ways to construct a hash function H : f0; 1g from a block cipher E: f0; 1g . They regarded 12 of these 64 schemes as secure, though no proofs or formal claims were given. The remaining 52 schemes were shown to be subject to various attacks. Here we provide a formal and quantitative treatment of the 64 constructions considered by PGV. We prove that, in a black-box model, the 12 schemes that PGV singled out as secure really are secure: we give tight upper and lower bounds on their collision resistance. Furthermore, by stepping outside of the Merkle-Damgard approach to analysis, we show that an additional 8 of the 64 schemes are just as collision resistant (...
Hash functions are often constructed based on permutations or blockciphers, and security proofs are ...
The security of iterated hash functions relies on the properties of underlying compression functions...
A generalized Feistel structure (GFS) is a classical approach to construct a block cipher from pseud...
Preneel, Govaerts, and Vandewalle [7] considered the 64 most basic ways to construct a hash function...
most basic ways to construct a hash function from a block cipher, and regarded 12 of those 64 scheme...
Abstract. Preneel, Govaerts, and Vandewalle[12] considered the 64 most basic ways to construct a has...
Preneel, Govaerts, and Vandewalle[12] considered the 64 most basic ways to construct a hash function...
Abstract. An important property of a hash function is the performance. We study fast iterated hash f...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
© Springer-Verlag Berlin Heidelberg 1994. Constructions for hash functions baaed on a block cipher a...
"December 2013""A thesis submitted for the degreee of Doctor of Philosophy"Includes bibliographical ...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
"A thesis submitted to Macquarie University for the degree of Doctor of Philosophy, Department of Co...
In CRYPTO’89, Merkle presented three double-block-length hash functions based on DES. They are optim...
© International Association for Cryptologic Research 2015. Hash functions are often constructed base...
Hash functions are often constructed based on permutations or blockciphers, and security proofs are ...
The security of iterated hash functions relies on the properties of underlying compression functions...
A generalized Feistel structure (GFS) is a classical approach to construct a block cipher from pseud...
Preneel, Govaerts, and Vandewalle [7] considered the 64 most basic ways to construct a hash function...
most basic ways to construct a hash function from a block cipher, and regarded 12 of those 64 scheme...
Abstract. Preneel, Govaerts, and Vandewalle[12] considered the 64 most basic ways to construct a has...
Preneel, Govaerts, and Vandewalle[12] considered the 64 most basic ways to construct a hash function...
Abstract. An important property of a hash function is the performance. We study fast iterated hash f...
© Springer-Verlag Berlin Heidelberg 1996. We consider constructions for cryptographic hash functions...
© Springer-Verlag Berlin Heidelberg 1994. Constructions for hash functions baaed on a block cipher a...
"December 2013""A thesis submitted for the degreee of Doctor of Philosophy"Includes bibliographical ...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
"A thesis submitted to Macquarie University for the degree of Doctor of Philosophy, Department of Co...
In CRYPTO’89, Merkle presented three double-block-length hash functions based on DES. They are optim...
© International Association for Cryptologic Research 2015. Hash functions are often constructed base...
Hash functions are often constructed based on permutations or blockciphers, and security proofs are ...
The security of iterated hash functions relies on the properties of underlying compression functions...
A generalized Feistel structure (GFS) is a classical approach to construct a block cipher from pseud...