Indifferentiability security of a hash mode of operation guarantees the mode\u27s resistance against all (meaningful) generic attacks. It is also useful to establish the security of protocols that use hash functions as random functions. The JH hash function is one of the five finalists in the ongoing NIST SHA-3 hash function competition. Despite several years of analysis, the indifferentiability security of the JH mode (with n-bit digest and 2n-bit permutation) has remained remarkably low, only at n/3 bits (FSE 2010), while the other four finalist modes -- with comparable parameter values -- offer a security guarantee of n/2 bits. In this paper, we improve the indifferentiability security bound for the JH mode to n/2 bits (e.g. from 171 to ...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
Indifferentiability security of a hash mode of operation guarantees the mode's resistance against al...
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaning...
In the recent years, several hash constructions have been introduced that aim at achieving enhanced ...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
International audience—In this paper, we propose a formal analysis of domain extenders for hash func...
At Crypto 2005, Coron et al. introduced a formalism to study the presence or absence of structural f...
Abstract. The classical design principle Merkle-Damg̊ard [13, 6] is scru-tinized by many ways such a...
In this paper we propose a new sequential mode of operation – the Fast wide pipe or FWP for short – ...
Abstract. Ristenpart et al. showed that the limitation of the indifferentiability theorem of Maurer ...
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of str...
Hash functions are one of the most important cryptographic primitives, but their desired security pr...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
Indifferentiability security of a hash mode of operation guarantees the mode's resistance against al...
A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaning...
In the recent years, several hash constructions have been introduced that aim at achieving enhanced ...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
International audience—In this paper, we propose a formal analysis of domain extenders for hash func...
At Crypto 2005, Coron et al. introduced a formalism to study the presence or absence of structural f...
Abstract. The classical design principle Merkle-Damg̊ard [13, 6] is scru-tinized by many ways such a...
In this paper we propose a new sequential mode of operation – the Fast wide pipe or FWP for short – ...
Abstract. Ristenpart et al. showed that the limitation of the indifferentiability theorem of Maurer ...
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of str...
Hash functions are one of the most important cryptographic primitives, but their desired security pr...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...