Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1942429 - MaRDI portal

scientific article; zbMATH DE number 1942429

From MaRDI portal
Publication:4409127

zbMath1026.94522MaRDI QIDQ4409127

John Black, Phillip Rogaway, Thomas Shrimpton

Publication date: 30 June 2003

Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2442/24420320.htm

Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (56)

How to build an ideal cipher: the indifferentiability of the Feistel constructionThe Whirlpool Secure Hash FunctionA note on quantum collision resistance of double-block-length compression functionsEfficient schemes for committing authenticated encryptionCharacterizing collision and second-preimage resistance in LinicryptAn analysis of the blockcipher-based hash functions from PGVSecurity analysis of randomize-hash-then-sign digital signaturesOpen problems in hash function securityCryptanalysis of GrindahlImproved domain extender for the ideal cipherKnown-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modesContext discovery and commitment attacks. How to break CCM, EAX, SIV, and moreRandomized half-ideal cipher on groups with applications to UC (a)PAKEHow (Not) to Efficiently Dither Blockcipher-Based Hash Functions?Simpira v2: A Family of Efficient Permutations Using the AES Round FunctionRotatable zero knowledge sets. Post compromise secure auditable dictionaries with application to key transparencyCollision attack on \({\mathtt Grindahl}\)\textsc{Poseidon}2: a faster version of the \textsc{Poseidon} hash function\texttt{Horst} meets \textit{Fluid}-SPN: Griffin for zero-knowledge applicationsAn algebraic attack on ciphers with low-degree round functions: application to full MiMCProbably Secure Keyed-Function Based Authenticated Encryption Schemes for Big DataSecurity of permutation-based compression function {\textsf{lp}}231A new black box analysis of hash functions based on block ciphersHow to Build a Hash Function from Any Collision-Resistant FunctionMJH: a faster alternative to MDC-2Analysis of Message Injection in Stream Cipher-Based Hash FunctionsOn the Security of Hash Functions Employing Blockcipher PostprocessingKnown-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing ModesTruncated differential based known-key attacks on round-reduced SIMONCollision Resistant Double-Length HashingInterpreting Hash Function Security ProofsBeyond Uniformity: Better Security/Efficiency Tradeoffs for Compression FunctionsConstructing Cryptographic Hash Functions from Fixed-Key BlockciphersPseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512On the collision and preimage security of MDC-4 in the ideal cipher modelBuilding indifferentiable compression functions from the PGV compression functionsAn Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash FunctionsA New Mode of Operation for Block Ciphers and Length-Preserving MACsSecurity/Efficiency Tradeoffs for Permutation-Based HashingMJH: A Faster Alternative to MDC-2A synthetic indifferentiability analysis of some block-cipher-based hash functionsSalvaging Merkle-Damgård for Practical ApplicationsA New Double-Block-Length Hash Function Using Feistel StructureCompactness of hashing modes and efficiency beyond Merkle treeSecurity of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher ModelCryptanalysis of Tweaked Versions of SMASH and ReparationA Scheme to Base a Hash Function on a Block CipherOn the impossibility of highly-efficient blockcipher-based hash functionsLinicrypt: A Model for Practical CryptographyPreimage resistance of \(\mathsf{LP}mkr\) with \(r=m-1\)XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security AssumptionsThe Symbiosis between Collision and Preimage ResistanceA Domain Extender for the Ideal CipherHash Functions and RFID Tags: Mind the GapQuantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functionsHashing Garbled Circuits for Free




This page was built for publication: