The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the security of hash functions. Concretely, it ensures that a hash function has no structural design flaws and thus guarantees security against generic attacks up to the exhibited bounds. In this work we prove the indifferentiability of Grøstl, a second round SHA-3 hash function candidate. Grøstl combines characteristics of the wide-pipe and chop-Merkle-Damgård iterations and uses two distinct permutations P and Q internally. Under the assumption that P and Q are random l-bit permutations, where l is the iterated state size of Grøstl, we prove that the advantage of a distinguisher to differentiate Grøstl from a random oracle is upper bounded by O((...
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of str...
Hash functions are one of the most important cryptographic primitives, but their desired security pr...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
In the recent years, several hash constructions have been introduced that aim at achieving enhanced ...
At Crypto 2005, Coron et al. introduced a formalism to study the presence or absence of structural f...
Indifferentiability security of a hash mode of operation guarantees the mode\u27s resistance against...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
Abstract. The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compress...
International audience—In this paper, we propose a formal analysis of domain extenders for hash func...
Indifferentiability security of a hash mode of operation guarantees the mode's resistance against al...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
Abstract Indifferentiability of iterated hash functions is seen as evidence that there are no struc...
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of str...
Hash functions are one of the most important cryptographic primitives, but their desired security pr...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
The notion of indifferentiability, introduced by Maurer et al., is an important criterion for the se...
In the recent years, several hash constructions have been introduced that aim at achieving enhanced ...
At Crypto 2005, Coron et al. introduced a formalism to study the presence or absence of structural f...
Indifferentiability security of a hash mode of operation guarantees the mode\u27s resistance against...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
Abstract. The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compress...
International audience—In this paper, we propose a formal analysis of domain extenders for hash func...
Indifferentiability security of a hash mode of operation guarantees the mode's resistance against al...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
In this paper, we observe that in the seminal work on indifferentiability analysis of iterated hash ...
Abstract Indifferentiability of iterated hash functions is seen as evidence that there are no struc...
Cryptographic hashing modes come in many flavors, including Merkle-Damgård with various types of str...
Hash functions are one of the most important cryptographic primitives, but their desired security pr...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...