This paper proposes a construction for collision resistant $2n$-bit hash functions, based on $n$-bit block ciphers with $2n$-bit keys. The construction is analysed in the ideal cipher model; for $n=128$ an adversary would need roughly $2^{122}$ units of time to find a collision. The construction employs ``combinatorial\u27\u27 hashing as an underlying building block (like Universal Hashing for cryptographic message authentication by Wegman and Carter). The construction runs at rate~1, thus improving on a similar rate~1/2 approach by Hirose (FSE 2006)
The security of iterated hash functions relies on the properties of underlying compression functions...
In this article, the security of double-block-length hash functions with the rate 1 is analyzed, who...
Cryptographic hash functions are used in many cryptographic applications, and the design of provably...
This paper proposes a construction for collision resistant $2n$-bit hash functions, based on $...
In this article, it is discussed how to construct a compression function with 2n-bit output using a ...
In this article, it is discussed how to construct a compression function with 2n-bit output using a...
© 2016, Springer Science+Business Media New York. The idea of double block length hashing is to cons...
In this work the security of the rate-1 double block length hash functions, which based on a block c...
The idea of double block length hashing is to construct a compression function on 2n bits using a bl...
Abstract. In this article, it is discussed how to construct a compression function with 2n-bit outpu...
Abstract. In this article, it is discussed how to construct a compres-sion function with 2n-bit outp...
Abstract. In this paper, we introduce a new class of double-block-length hash functions. Using the i...
A double-block-length (DBL) hash mode of block ciphers, MJH has been proved to be collision-resistan...
In CRYPTO’89, Merkle presented three double-block-length hash functions based on DES. They are optim...
We prove that Tandem-DM, one of the two ``classical\u27\u27 schemes for turning a blockcipher of $2...
The security of iterated hash functions relies on the properties of underlying compression functions...
In this article, the security of double-block-length hash functions with the rate 1 is analyzed, who...
Cryptographic hash functions are used in many cryptographic applications, and the design of provably...
This paper proposes a construction for collision resistant $2n$-bit hash functions, based on $...
In this article, it is discussed how to construct a compression function with 2n-bit output using a ...
In this article, it is discussed how to construct a compression function with 2n-bit output using a...
© 2016, Springer Science+Business Media New York. The idea of double block length hashing is to cons...
In this work the security of the rate-1 double block length hash functions, which based on a block c...
The idea of double block length hashing is to construct a compression function on 2n bits using a bl...
Abstract. In this article, it is discussed how to construct a compression function with 2n-bit outpu...
Abstract. In this article, it is discussed how to construct a compres-sion function with 2n-bit outp...
Abstract. In this paper, we introduce a new class of double-block-length hash functions. Using the i...
A double-block-length (DBL) hash mode of block ciphers, MJH has been proved to be collision-resistan...
In CRYPTO’89, Merkle presented three double-block-length hash functions based on DES. They are optim...
We prove that Tandem-DM, one of the two ``classical\u27\u27 schemes for turning a blockcipher of $2...
The security of iterated hash functions relies on the properties of underlying compression functions...
In this article, the security of double-block-length hash functions with the rate 1 is analyzed, who...
Cryptographic hash functions are used in many cryptographic applications, and the design of provably...