Formal Algebraic Reasoning About Compression Function Security

Z Javar - 2024 - dspace.library.uvic.ca
Building efficient hash functions with proven security can be … 1 and Group 2 [4] PGV
compression functions [32]. This compo… , in order to construct indifferentiable hash functions we …

On Efficient and Secure Compression Functions for Arithmetization-Oriented Hashing

E Andreeva, R Bhattacharyya, A Roy… - 2024 IEEE 37th …, 2024 - computer.org
… arbitrary group, its formalrandomoracle indifferentiability [43] proof … -based AOFIL compression
function strategy PGV-LC. … of modes to build secure compression and hash functions from …

On Efficient and Secure Compression Modes for Arithmetization-Oriented Hashing

E Andreeva, R Bhattacharyya, A Roy… - Cryptology ePrint …, 2024 - eprint.iacr.org
… , its formal random-oracle indifferentiability [58] proof was only … From PGV-LC, we derive the
next FIL compression function … modes to build secure compression and hash functions from …

Impossibility of indifferentiable iterated blockciphers from 3 or less primitive calls

C Guo, L Wang, D Lin - Annual International Conference on the Theory …, 2023 - Springer
Indifferentiability. While ICs are unachievable in the standard model [12, 41], it … build ICs
from other public ideal functions. This class of problem shall be addressed with indifferentiability

Linicrypt in the Ideal Cipher Model

Z Javar, BM Kapron - International Conference on Provable Security, 2023 - Springer
… One basic approach to build hash functions is by the iteration … 4, we model the PGV
compression functions in Linicrypt and … properties for hash functions, such as indifferentiability [9]. …

Evolutionary double-pipe prefix-free hash function

H Mirvaziri - Journal of Information and Optimization Sciences, 2020 - Taylor & Francis
… in the sense of indifferentiability to design more secure hash functions or more secure … of
PGV selection are really secure structures. Among them most popular compression functions

Compactness of hashing modes and efficiency beyond Merkle tree

E Andreeva, R Bhattacharyya, A Roy - … on the Theory and Applications of …, 2021 - Springer
build a compression function and the classical constructions of MD5 and SHA1, SHA2 hash
… the indifferentiability composition theorem and replace the leaf level compression function of …

Block-cipher-based tree hashing

A Gunsing - Annual International Cryptology Conference, 2022 - Springer
… be possible to build a MAC … compression function is used as a primitive. They also show
that one can use a truncated permutation to create a compression function that is indifferentiable

Constructing Random Oracles—Indifferentiability

A Mittelbach, M Fischlin, A Mittelbach… - … Theory of Hash Functions …, 2021 - Springer
function for a compression function h which we assume is ideal. When we construct Hh then
we aim at building … For example, all PGV compression functions (see Section 14.1.3; page …

Poseidon2: A Faster Version of the Poseidon Hash Function

L Grassi, D Khovratovich, M Schofnegger - International Conference on …, 2023 - Springer
… , precisely matching our need for building a Merkle tree and … , the sponge construction is
indifferentiable from a random oracle up to … Here we focus on compression functions defined by …