J Black - Fast Software Encryption: 13th International Workshop …, 2006 - Springer
Abstract The Ideal-Cipher Model of a blockcipher is a well-known and widely-used model dating back to Shannon [25] and has seen frequent use in proving the security of various …
J Black - USENIX Annual Technical Conference, General Track, 2006 - usenix.org
Compare-by-hash is the now-common practice used by systems designers who assume that when the digest of a cryptographic hash function is equal on two distinct files, then those …
Understanding what construction strategy has a chance to be a good hash function is extremely important nowadays. In TCC'04, Maurer et al.[13] introduced the notion of …
JJ Hoch, A Shamir - Fast Software Encryption: 13th International Workshop …, 2006 - Springer
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today …
W Stallings - Cryptologia, 2006 - Taylor & Francis
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less …
D Boneh, X Boyen - Advances in Cryptology-CRYPTO 2006: 26th Annual …, 2006 - Springer
Let H 1, H 2 be two hash functions. We wish to construct a new hash function H that is collision resistant if at least one of H 1 or H 2 is collision resistant. Concatenating the output …
K Okeya - Australasian Conference on Information Security and …, 2006 - Springer
HMAC is one of the most famous keyed hash functions, and widely utilized. In order to design secure hash functions, we often use PGV construction consisting of 64 schemes …
The design of secure compression functions is of vital importance to hash function development. In this paper we consider the problem of combining smaller trusted …