On the impossibility of highly-efficient blockcipher-based hash functions

J Black, M Cochran, T Shrimpton - … on the Theory and Applications of …, 2005 - Springer
Fix a small, non-empty set of blockcipher keys \mathcalK. We say a blockcipher-based hash
function is highly-efficient if it makes exactly one blockcipher call for each message block …

The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function

J Black - Fast Software Encryption: 13th International Workshop …, 2006 - Springer
Abstract The Ideal-Cipher Model of a blockcipher is a well-known and widely-used model
dating back to Shannon [25] and has seen frequent use in proving the security of various …

An analysis of the blockcipher-based hash functions from PGV

J Black, P Rogaway, T Shrimpton, M Stam - Journal of Cryptology, 2010 - Springer
Abstract Preneel, Govaerts, and Vandewalle (1993) considered the 64 most basic ways to
construct a hash function H:\;\:{0,1\}^*→{0,1\}^n from a blockcipher E:\;\:{0,1\}^n*{0,1\}^n→{0 …

Black-box analysis of the block-cipher-based hash-function constructions from PGV

J Black, P Rogaway, T Shrimpton - … , California, USA, August 18–22, 2002 …, 2002 - Springer
Abstract Preneel, Govaerts, and Vandewalle [6] considered the 64 most basic ways to
construct a hash function H:(0, 1)*→(0, 1) n from a block cipher E:(0, 1) n×(0, 10 n→(0, 1) n …

Constructing cryptographic hash functions from fixed-key blockciphers

P Rogaway, J Steinberger - Advances in Cryptology–CRYPTO 2008: 28th …, 2008 - Springer
We propose a family of compression functions built from fixed-key blockciphers and
investigate their collision and preimage security in the ideal-cipher model. The constructions …

Merkle-Damgård revisited: How to construct a hash function

JS Coron, Y Dodis, C Malinaud, P Puniya - Advances in Cryptology …, 2005 - Springer
The most common way of constructing a hash function (eg, SHA-1) is to iterate a
compression function on the input message. The compression function is usually designed …

[PDF][PDF] Building hash functions from block ciphers, their security and implementation properties

T Bartkewitz - Ruhr-University Bochum, 2009 - Citeseer
This work deals with methods to construct a hash function containing a compression function
that is built from a block cipher. There are many schemes to turn a block cipher into a …

The Whirlpool secure hash function

W Stallings - Cryptologia, 2006 - Taylor & Francis
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function.
Whirlpool produces a hash code of 512 bits for an input message of maximum length less …

2n-bit hash-functions using n-bit symmetric block cipher algorithms

JJ Quisquater, M Girault - Workshop on the Theory and Application of of …, 1989 - Springer
We present a new hash-function, which provides 2n-bit hash-results, using any n-bit
symmetric block cipher algorithm. This hash-function can be considered as a extension of an …

Combining compression functions and block cipher-based hash functions

T Peyrin, H Gilbert, F Muller, M Robshaw - Advances in Cryptology …, 2006 - Springer
The design of secure compression functions is of vital importance to hash function
development. In this paper we consider the problem of combining smaller trusted …