Security of Cyclic Double Block Length Hash Functions
From MaRDI portal
Publication:3654617
DOI10.1007/978-3-642-10868-6_10zbMath1234.94039OpenAlexW1505322521MaRDI QIDQ3654617
Ewan Fleischmann, Michael Gorski, Stefan Lucks
Publication date: 7 January 2010
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-10868-6_10
ideal cipher modelproof of securityblock cipher basedcryptographic hash functiondouble-block lengthAbreast-DMCyclic-DM
Related Items (12)
Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles ⋮ Aggregated differentials and cryptanalysis of PP-1 and GOST ⋮ The security of tandem-DM in the ideal cipher model ⋮ An analysis of the blockcipher-based hash functions from PGV ⋮ Open problems in hash function security ⋮ Attacks on a double length blockcipher-based hash proposal ⋮ MJH: a faster alternative to MDC-2 ⋮ Optimal collision security in double block length hashing with single length key ⋮ Collision Resistant Double-Length Hashing ⋮ On the collision and preimage security of MDC-4 in the ideal cipher model ⋮ MJH: A Faster Alternative to MDC-2 ⋮ Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions
This page was built for publication: Security of Cyclic Double Block Length Hash Functions