Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we introduce new compression function design principles supporting variable output lengths (multiples of size n). They are based on a function or block cipher with an n-bit output size. In the case of the compression function with a (t+1)n-bit output size, in the random oracle and ideal cipher models, their maximum advantages from the perspective of collision resistance are O(t2q/2tn+q2/2(t+1)n). In the case of t=1, the advantage is near-optimal. In the case of t>1, the advantage is optimal.
- (社)電子情報通信学会の論文
- 2008-09-01
著者
-
CHANG Donghoon
Center for Information and Security Technologies, Korea University
-
Lim J
Center For Information Security Technologies (cist) Korea University
-
Lim Jongin
Center For Information And Security Technologies (cist) Korea University
-
Hong Seokhie
Center For Information Security Technologies (cist) Korea University
-
Chang Donghoon
Center For Information Security Technologies (cist) Korea University
-
Chang Donghoon
Center For Information And Security Technologies Korea University
-
NANDI Mridul
CINVESTAV-IPN
-
LEE Jesang
Center for Information Security Technologies (CIST), Korea University
-
SUNG Jaechul
Dep. of Mathematics, University of Seoul
-
PARK Haeryong
Korea Information Security Agency (KISA)
-
CHUN Kilsoo
Korea Information Security Agency (KISA)
-
SUNG Jaechul
University of Seoul
-
Lee Jesang
Center For Information Security Technologies (cist) Korea University
関連論文
- 擬似ランダム関数族の定義に関する考察
- Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
- Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
- Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
- Impossible Differential Cryptanalysis of Zodiac(Special Section on Cryptography and Information Security)
- Construction of UOWHF : Two New Parallel Methods(Symmetric Key Cryptography)(Cryptography and Information Security)
- Side Channel Cryptanalysis on XTR Public Key Cryptosystem(Discrete Mathematics and Its Applications)
- Linear Attack Using Multiple Linear Approximations(Symmetric Key Cryptography)(Cryptography and Information Security)
- Known-Key Attacks on Generalized Feistel Schemes with SP Round Function
- Known-Key Attacks on Generalized Feistel Schemes with SP Round Function