Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier
From MaRDI portal
Publication:293718
DOI10.1515/jmc-2014-0044zbMath1408.94954OpenAlexW2341914780WikidataQ121045655 ScholiaQ121045655MaRDI QIDQ293718
Daniel Smith-Tone, Dustin Moody, Souradyuti Paul
Publication date: 9 June 2016
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2014-0044
Cites Work
- Improved indifferentiability security bound for the JH mode
- On the complexity of the herding attack and some related attacks on hash functions
- Techniques for cryptanalysis of block ciphers. (to appear)
- A measure of dependence for cryptographic primitives relative to ideal functions
- Careful with Composition: Limitations of the Indifferentiability Framework
- On the Security of Hash Functions Employing Blockcipher Postprocessing
- Speeding Up the Wide-Pipe: Secure and Fast Hashing
- Some Observations on Indifferentiability
- Provable Security of BLAKE with Non-ideal Compression Function
- Improved Indifferentiability Security Analysis of chopMD Hash Function
- Multicollision Attacks on Some Generalized Sequential Hash Functions
- Security Analysis of the Mode of JH Hash Function
- On the Indifferentiability of the Grøstl Hash Function
- Herding Hash Functions and the Nostradamus Attack
- Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
- Advances in Cryptology – CRYPTO 2004
- Second Preimages on n-Bit Hash Functions for Much Less than 2 n Work
- A Simple Variant of the Merkle-Damgård Scheme with a Permutation
- Merkle-Damgård Revisited: How to Construct a Hash Function
- A Failure-Friendly Design Principle for Hash Functions
- On the Indifferentiability of the Sponge Construction
- Second Preimage Attacks on Dithered Hash Functions
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- Theory of Cryptography
- One Way Hash Functions and DES
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier