We present the first collision and preimage security analysis of MDC-4, a 24 years old construction for transforming an n-bit block cipher into a 2n-bit hash function. We start with the MDC-4 compression function based on two independent block ciphers, and prove that any adversary with query access to the underlying block ciphers requires at least 2^{5n/8} queries (asymptotically) to find a collision, and at least 2^{5n/4} queries to find a preimage. These results then directly carry over to the MDC-4 hash function design. Next, we consider MDC-4 based on one single block cipher, and confirm that the collision bound carries over to the single block cipher setting. In case of preimage resistance we present a more negative result: for a targe...
Abstract. This paper considers hash functions based on block ciphers. It presents a new attack on th...
Abstract. We provide the first proof of security for Tandem-DM, one of the oldest and most well-know...
most basic ways to construct a hash function from a block cipher, and regarded 12 of those 64 scheme...
In this paper, we provide some cryptanalytic results for double-block-length (DBL) hash modes of blo...
In this paper, we make attacks on DBL (Double-Block-Length) hash modes of block ciphers with $n$-bit...
In this paper, we provide some cryptanalytic results for double-block-length (DBL) hash modes of blo...
© 2016, Springer Science+Business Media New York. The idea of double block length hashing is to cons...
The idea of double block length hashing is to construct a compression function on 2n bits using a bl...
Abstract. In Eurocrypt’05, Wang et al. presented new techniques to find collisions of Hash function ...
We prove that Tandem-DM, one of the two ``classical\u27\u27 schemes for turning a blockcipher of $2...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
A double-block-length (DBL) hash mode of block ciphers, MJH has been proved to be collision-resistan...
Abstract. In this paper, we introduce a new class of double-block-length hash functions. Using the i...
This paper considers hash functions based on block ciphers. It presents a new attack on the compress...
Abstract. This paper considers hash functions based on block ciphers. It presents a new attack on th...
Abstract. We provide the first proof of security for Tandem-DM, one of the oldest and most well-know...
most basic ways to construct a hash function from a block cipher, and regarded 12 of those 64 scheme...
In this paper, we provide some cryptanalytic results for double-block-length (DBL) hash modes of blo...
In this paper, we make attacks on DBL (Double-Block-Length) hash modes of block ciphers with $n$-bit...
In this paper, we provide some cryptanalytic results for double-block-length (DBL) hash modes of blo...
© 2016, Springer Science+Business Media New York. The idea of double block length hashing is to cons...
The idea of double block length hashing is to construct a compression function on 2n bits using a bl...
Abstract. In Eurocrypt’05, Wang et al. presented new techniques to find collisions of Hash function ...
We prove that Tandem-DM, one of the two ``classical\u27\u27 schemes for turning a blockcipher of $2...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
In this paper we present concrete collision and preimage attacks on a large class of compression fun...
A double-block-length (DBL) hash mode of block ciphers, MJH has been proved to be collision-resistan...
Abstract. In this paper, we introduce a new class of double-block-length hash functions. Using the i...
This paper considers hash functions based on block ciphers. It presents a new attack on the compress...
Abstract. This paper considers hash functions based on block ciphers. It presents a new attack on th...
Abstract. We provide the first proof of security for Tandem-DM, one of the oldest and most well-know...
most basic ways to construct a hash function from a block cipher, and regarded 12 of those 64 scheme...