Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Some Plausible Constructions of Double-Block-Length Hash Functions - MaRDI portal

Some Plausible Constructions of Double-Block-Length Hash Functions

From MaRDI portal
Publication:3618655

DOI10.1007/11799313_14zbMath1234.94046OpenAlexW1547189451MaRDI QIDQ3618655

Shouichi Hirose

Publication date: 2 April 2009

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11799313_14




Related Items (29)

Blockcipher-Based Double-Length Hash Functions for Pseudorandom OraclesLHash: A Lightweight Hash Function\textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryptionA note on quantum collision resistance of double-block-length compression functionsThe security of tandem-DM in the ideal cipher modelTowards Understanding the Known-Key Security of Block CiphersOpen problems in hash function securityCryptanalysis of GrindahlIndifferentiability of the confusion-diffusion network and the cascade block cipherAttacks on a double length blockcipher-based hash proposalEfficient leakage-resilient MACs without idealized assumptionsDouble-block-length hash function for minimum memory sizeCollision attack on \({\mathtt Grindahl}\)Security of permutation-based compression function {\textsf{lp}}231MJH: a faster alternative to MDC-2On the Security of Hash Functions Employing Blockcipher PostprocessingOptimal collision security in double block length hashing with single length keyCollision Resistant Double-Length HashingBeyond Uniformity: Better Security/Efficiency Tradeoffs for Compression FunctionsConstructing Cryptographic Hash Functions from Fixed-Key BlockciphersOn the collision and preimage security of MDC-4 in the ideal cipher modelMJH: A Faster Alternative to MDC-2A synthetic indifferentiability analysis of some block-cipher-based hash functionsCryptanalysis of MDC-2Salvaging Merkle-Damgård for Practical ApplicationsA New Double-Block-Length Hash Function Using Feistel StructurePreimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\)Hash Functions and RFID Tags: Mind the GapQuantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions




This page was built for publication: Some Plausible Constructions of Double-Block-Length Hash Functions