Salvaging Merkle-Damgård for Practical Applications
From MaRDI portal
Publication:3627446
DOI10.1007/978-3-642-01001-9_22zbMath1239.94047OpenAlexW16894843MaRDI QIDQ3627446
Yevgeniy Dodis, Thomas Ristenpart, Thomas Shrimpton
Publication date: 12 May 2009
Published in: Advances in Cryptology - EUROCRYPT 2009 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01001-9_22
Related Items (19)
Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles ⋮ Separating invertible key derivations from non-invertible ones: sequential indifferentiability of 3-round Even-Mansour ⋮ An analysis of the blockcipher-based hash functions from PGV ⋮ Towards Understanding the Known-Key Security of Block Ciphers ⋮ Open problems in hash function security ⋮ Hardening signature schemes via derive-then-derandomize: stronger security proofs for EdDSA ⋮ Simpira v2: A Family of Efficient Permutations Using the AES Round Function ⋮ A modular approach to the incompressibility of block-cipher-based AEADs ⋮ Sequential indifferentiability of confusion-diffusion networks ⋮ The hunting of the SNARK ⋮ Revisiting the indifferentiability of the sum of permutations ⋮ Strengthening the Known-Key Security Notion for Block Ciphers ⋮ Стойкость ГОСТ Р 34.11-2012 к атаке поиска прообраза и к атаке поиска коллизий ⋮ On the Security of Hash Functions Employing Blockcipher Postprocessing ⋮ Building indifferentiable compression functions from the PGV compression functions ⋮ Salvaging Merkle-Damgård for Practical Applications ⋮ Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model ⋮ Indifferentiability for public key cryptosystems ⋮ Analysis of client-side security for long-term time-stamping services
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A forward-secure public-key encryption scheme
- The Exact Security of Digital Signatures-How to Sign with RSA and Rabin
- The random oracle methodology, revisited
- Getting the Best Out of Existing Hash Functions; or What if We Are Stuck with SHA?
- Extractable Perfectly One-Way Functions
- Building a Collision-Resistant Compression Function from Non-compressing Primitives
- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
- Towards a Theory of Extractable Functions
- Some Plausible Constructions of Double-Block-Length Hash Functions
- Salvaging Merkle-Damgård for Practical Applications
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Advances in Cryptology - EUROCRYPT 2004
- A Simple Variant of the Merkle-Damgård Scheme with a Permutation
- How to Build a Hash Function from Any Collision-Resistant Function
- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
- Provably Secure Double-Block-Length Hash Functions in a Black-Box Model
- Merkle-Damgård Revisited: How to Construct a Hash Function
- A New Mode of Operation for Block Ciphers and Length-Preserving MACs
- Security/Efficiency Tradeoffs for Permutation-Based Hashing
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
- Leaky Random Oracle (Extended Abstract)
- Theory of Cryptography
This page was built for publication: Salvaging Merkle-Damgård for Practical Applications