In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash functions by Coron et al. and in subsequent works, the initial value (IV) of hash functions is fixed. In addition, these indifferentiability results do not depend on the Merkle–Damgård (MD) strengthening in the padding functionality of the hash functions. We propose a generic n -bit-iterated hash function framework based on an n -bit compression function called suffix-free-prefix-free (SFPF) that works for arbitrary IV s and does not possess MD strengthening. We formally prove that SFPF is indifferentiable from a random oracle (RO) when the compression function is viewed as a fixed input-length random oracle (FIL-RO). We show that some hash f...
In the recent years, several hash constructions have been introduced that aim at achieving enhanced ...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
Abstract Indifferentiability of iterated hash functions is seen as evidence that there are no struct...
Abstract Indifferentiability of iterated hash functions is seen as evidence that there are no struc...
At Crypto 2005, Coron et al. introduced a formalism to study the presence or absence of structural f...
Abstract. The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compress...
Nearly all modern hash functions are constructed by iterating a compression function. At FSE’04, Rog...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Indifferentiability security of a hash mode of operation guarantees the mode's resistance against al...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
In the recent years, several hash constructions have been introduced that aim at achieving enhanced ...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
Abstract Indifferentiability of iterated hash functions is seen as evidence that there are no struct...
Abstract Indifferentiability of iterated hash functions is seen as evidence that there are no struc...
At Crypto 2005, Coron et al. introduced a formalism to study the presence or absence of structural f...
Abstract. The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compress...
Nearly all modern hash functions are constructed by iterating a compression function. At FSE’04, Rog...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
Indifferentiability security of a hash mode of operation guarantees the mode's resistance against al...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
In the recent years, several hash constructions have been introduced that aim at achieving enhanced ...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...
This article presents a sequential domain extension scheme with minimum padding for hashing using a ...