Revisiting the Indifferentiability of PGV Hash Functions
暂无分享,去创建一个
Bo Zhu | Zheng Gong | Xuejia Lai | Yiyuan Luo | Ming Duan
[1] Yevgeniy Dodis,et al. Salvaging Merkle-Damgard for Practical Applications , 2009, IACR Cryptol. ePrint Arch..
[2] Mihir Bellare,et al. Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms , 2007, ICALP.
[3] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[4] Kefei Chen,et al. A synthetic indifferentiability analysis of some block-cipher-based hash functions , 2008, Des. Codes Cryptogr..
[5] Shoichi Hirose,et al. A Simple Variant of the Merkle–Damgård Scheme with a Permutation , 2010, Journal of Cryptology.
[6] Donghoon Chang,et al. Improved Indifferentiability Security Analysis of chopMD Hash Function , 2008, FSE.
[7] Ronald L. Rivest,et al. Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6 , 2009, FSE.
[8] Guido Bertoni,et al. On the Indifferentiability of the Sponge Construction , 2008, EUROCRYPT.
[9] John Black,et al. Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV , 2002, CRYPTO.
[10] Ralph C. Merkle,et al. One Way Hash Functions and DES , 1989, CRYPTO.
[11] Moti Yung,et al. Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding , 2006, ASIACRYPT.
[12] Joos Vandewalle,et al. Hash Functions Based on Block Ciphers: A Synthetic Approach , 1993, CRYPTO.
[13] Hidenori Kuwakado,et al. Indifferentiability of Single-Block-Length and Rate-1 Compression Functions , 2007, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[14] Ueli Maurer,et al. Domain Extension of Public Random Functions: Beyond the Birthday Barrier , 2007, CRYPTO.
[15] Shoichi Hirose,et al. Some Plausible Constructions of Double-Block-Length Hash Functions , 2006, FSE.
[16] Ueli Maurer,et al. Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology , 2004, TCC.
[17] Jean-Sébastien Coron,et al. Merkle-Damgård Revisited: How to Construct a Hash Function , 2005, CRYPTO.
[18] Jean-Sébastien Coron,et al. The Random Oracle Model and the Ideal Cipher Model Are Equivalent , 2008, CRYPTO.
[19] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[20] Mihir Bellare,et al. Multi-Property-Preserving Hash Domain Extension and the EMD Transform , 2006, ASIACRYPT.
[21] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.