This article discusses the provable security of an iterated hash function using a block cipher. It assumes the construction using the Matyas-Meyer-Oseas (MMO) scheme for the compression function and the Merkle-Damg˚ard with a permutation (MDP) for the domain extension transform. It is shown that this kind of hash function, MDPMMO, is indifferentiable from the variable-input-length random oracle in the ideal cipher model. It is also shown that HMAC using MDPMMO is a pseudorandom function if the underlying block cipher is a pseudorandom permutation under the related-key attack with respect to the permutation used in MDP. Actually, the latter result also assumes that the following function is a pseudorandom bit generator: (E_<IV>(K ⊕ opad) ⊕ K...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals...
Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a ...
Abstract. This article discusses the provable security of an iterated hash function using a block ci...
Abstract. The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compress...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
HMAC is a widely used message authentication code and a pseudorandom function generator based on cry...
We propose a new composition scheme for hash functions. It is a variant of the Merkle-Damg??ard cons...
We propose a new composition scheme for hash functions. It is a variant of the Merkle-DamgAyenrd con...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
© Springer-Verlag Berlin Heidelberg 1994. Constructions for hash functions baaed on a block cipher a...
In the recent years, several hash constructions have been introduced that aim at achieving enhanced ...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
PMAC is a simple and parallel block-cipher mode of operation, which was introduced by Black and Roga...
PMAC is a simple and parallel block-cipher mode of operation, which was introduced by Black and Roga...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals...
Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a ...
Abstract. This article discusses the provable security of an iterated hash function using a block ci...
Abstract. The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compress...
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression functi...
HMAC is a widely used message authentication code and a pseudorandom function generator based on cry...
We propose a new composition scheme for hash functions. It is a variant of the Merkle-Damg??ard cons...
We propose a new composition scheme for hash functions. It is a variant of the Merkle-DamgAyenrd con...
Cryptographic hash functions form the basis of the security of today's digital environment, and find...
© Springer-Verlag Berlin Heidelberg 1994. Constructions for hash functions baaed on a block cipher a...
In the recent years, several hash constructions have been introduced that aim at achieving enhanced ...
Traditionally, modes of Message Authentication Codes(MAC) such as Cipher Block Chaining (CBC) are in...
PMAC is a simple and parallel block-cipher mode of operation, which was introduced by Black and Roga...
PMAC is a simple and parallel block-cipher mode of operation, which was introduced by Black and Roga...
Abstract. In the last years, much research work has been invested into the security analysis of key ...
Cryptographic hash functions are an important tool in cryptography to achieve certain security goals...
Abstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a ...