Hash functions based on block ciphers: A synthetic approach

B Preneel, R Govaerts, J Vandewalle - Advances in Cryptology—CRYPTO' …, 1994 - Springer
Constructions for hash functions based on a block cipher are studied where the size of the
hashcode is equal to the block length of the block cipher and where the key size is …

Hash functions based on block ciphers

X Lai, JL Massey - Workshop on the Theory and Application of of …, 1992 - Springer
Iterated hash functions based on block ciphers are treated. Five attacks on an iterated hash
function and on its round function are formulated. The wisdom of strengthening such hash …

[PDF][PDF] Analysis and design of cryptographic hash functions

B Preneel - 1993 - Citeseer
The subject of this thesis is the study of cryptographic hash functions. The importance of
hash functions for protecting the authenticity of information is demonstrated. Applications …

One way hash functions and DES

RC Merkle - Conference on the Theory and Application of …, 1989 - Springer
One way hash functions are a major tool in cryptography. DES is the best known and most
widely used encryption function in the commercial world today. Generating a one-way hash …

[图书][B] Design of hashing algorithms

J Pieprzyk, B Sadeghiyan - 1993 - Springer
In Chapter 2, we listed the properties that a secure hash function should satisfy, among them
was the property of one-wayness. Several approaches to constructing hash functions have …

Some plausible constructions of double-block-length hash functions

S Hirose - International Workshop on Fast Software Encryption, 2006 - Springer
In this article, it is discussed how to construct a compression function with 2 n-bit output
using a component function with n-bit output. The component function is either a smaller …

Merkle-Damgård revisited: How to construct a hash function

JS Coron, Y Dodis, C Malinaud, P Puniya - Advances in Cryptology …, 2005 - Springer
The most common way of constructing a hash function (eg, SHA-1) is to iterate a
compression function on the input message. The compression function is usually designed …

[PDF][PDF] Cryptographic hash functions: A survey

S Bakhtiari, R Safavi-Naini, J Pieprzyk - 1995 - Citeseer
This paper gives a survey on cryptographic hash functions. It gives an overview of all types
of hash functions and reviews design principals and possible methods of attacks. It also …

Black-box analysis of the block-cipher-based hash-function constructions from PGV

J Black, P Rogaway, T Shrimpton - … , California, USA, August 18–22, 2002 …, 2002 - Springer
Abstract Preneel, Govaerts, and Vandewalle [6] considered the 64 most basic ways to
construct a hash function H:(0, 1)*→(0, 1) n from a block cipher E:(0, 1) n×(0, 10 n→(0, 1) n …

Design principles for iterated hash functions

S Lucks - Cryptology ePrint Archive, 2004 - eprint.iacr.org
This paper deals with the security of iterated hash functions against generic attacks, such as,
eg, Joux'multicollision attacks from Crypto 04. The core idea is to increase the size of the …