PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis(Symmetric Key Cryptography)(<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
In [1] it was proved that 20 of 64 PGV hash functions [2] based on block cipher are collision-resistant and one-way in the black-box model of the underlying block cipher. Here, we generalize the definition of PGV-hash function into a hash family and we will prove that, aside from the previously reported 20 hash functions, we have 22 more collision-resistant and one-way hash families. As all these 42 families are keyed hash family, these are also target-collision-resistant. All these 42 hash families have tight upper and lower bounds on (target) collision-resistant and one-wayness.
- 社団法人電子情報通信学会の論文
- 2005-01-01
著者
-
LEE Sangjin
Center for Information Security Technologies, Korea University
-
Lee S
Center For Information Security Technologies (cist) Korea University
-
Lee Sangjin
Center For Information Security Technologies (cist) Korea University
-
Sakurai Kouichi
Faculty Of Information Science And Electrical Engineering Kyushu University
-
Nandi Muralidhar
Applied Statistics Unit Indian Statistical Institute
-
Chang D
Center For Information Security Technologies (cist) Korea University
-
Sakurai Kouichi
Faculty Of Computer Science And Communication Engineering Kyushu University
-
NANDI Mridul
Applied Statistics Unit, Indian Statistical Institute
-
LEE Wonil
Faculty of Information Science and Electrical Engineering, Kyushu University
-
SARKAR Palash
Applied Statistics Unit, Indian Statistical Institute
-
CHENG Donghoon
Center for Information Security Technologies (CIST), Korea University
-
Lee W
Faculty Of Information Science And Electrical Engineering Kyushu University
-
Sarkar Palash
Applied Statistics Unit Indian Statistical Institute
-
Sakurai Kouichi
Faculty of Information Science and Electrical Engineering, Kyushu University
関連論文
- DRBAC Model Using a WSNM for Services in i-Home(New Technologies and their Applications of the Internet IV)
- A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment(Application)(Cryptography and Information Security)
- Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider(Network Security)
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- A-7-21 Security Policy Pre-evaluation towards Risk Analysis
- Securing Provenance by Distributing the Provenance Storage
- Securing provenance by distributing the provenance storage (マルチメディア通信と分散処理・コンピュータセキュリティ)
- Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems(Special Section on Cryptography and Information Security)
- Impossible Differential Cryptanalysis of Zodiac(Special Section on Cryptography and Information Security)
- Construction of UOWHF : Two New Parallel Methods(Symmetric Key Cryptography)(Cryptography and Information Security)
- PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- Additive Noise Response of a Charge Pump Phase-Locked Loop
- A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems
- Analysis and Design of SHA-V and RIPEMD-V with Variable Output-Length
- Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems(Side Channel Analysis, Cryptography and Information Security)
- Linear Attack Using Multiple Linear Approximations(Symmetric Key Cryptography)(Cryptography and Information Security)
- A Genetic Optimization Approach to Operation of a Multi-head Surface Mounting Machine
- Enhancing Airport Access Control Security with Multiple Biometrics Contactless Smart Card (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider