Some Plausible Constructions of Double-Block-Length Hash Functions
From MaRDI portal
Publication:3618655
DOI10.1007/11799313_14zbMath1234.94046OpenAlexW1547189451MaRDI QIDQ3618655
Publication date: 2 April 2009
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11799313_14
Related Items (29)
Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles ⋮ LHash: A Lightweight Hash Function ⋮ \textsf{TEDT2} -- highly secure leakage-resilient TBC-based authenticated encryption ⋮ A note on quantum collision resistance of double-block-length compression functions ⋮ The security of tandem-DM in the ideal cipher model ⋮ Towards Understanding the Known-Key Security of Block Ciphers ⋮ Open problems in hash function security ⋮ Cryptanalysis of Grindahl ⋮ Indifferentiability of the confusion-diffusion network and the cascade block cipher ⋮ Attacks on a double length blockcipher-based hash proposal ⋮ Efficient leakage-resilient MACs without idealized assumptions ⋮ Double-block-length hash function for minimum memory size ⋮ Collision attack on \({\mathtt Grindahl}\) ⋮ Security of permutation-based compression function {\textsf{lp}}231 ⋮ MJH: a faster alternative to MDC-2 ⋮ On the Security of Hash Functions Employing Blockcipher Postprocessing ⋮ Optimal collision security in double block length hashing with single length key ⋮ Collision Resistant Double-Length Hashing ⋮ Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions ⋮ Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers ⋮ On the collision and preimage security of MDC-4 in the ideal cipher model ⋮ MJH: A Faster Alternative to MDC-2 ⋮ A synthetic indifferentiability analysis of some block-cipher-based hash functions ⋮ Cryptanalysis of MDC-2 ⋮ Salvaging Merkle-Damgård for Practical Applications ⋮ A New Double-Block-Length Hash Function Using Feistel Structure ⋮ Preimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\) ⋮ Hash Functions and RFID Tags: Mind the Gap ⋮ Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
This page was built for publication: Some Plausible Constructions of Double-Block-Length Hash Functions