DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Jooyoung | ko |
dc.contributor.author | Stam, Martijn | ko |
dc.date.accessioned | 2016-09-06T08:57:43Z | - |
dc.date.available | 2016-09-06T08:57:43Z | - |
dc.date.created | 2016-08-05 | - |
dc.date.created | 2016-08-05 | - |
dc.date.created | 2016-08-05 | - |
dc.date.created | 2016-08-05 | - |
dc.date.issued | 2015-08 | - |
dc.identifier.citation | DESIGNS CODES AND CRYPTOGRAPHY, v.76, no.2, pp.179 - 205 | - |
dc.identifier.issn | 0925-1022 | - |
dc.identifier.uri | http://hdl.handle.net/10203/212424 | - |
dc.description.abstract | In this paper, we introduce a new class of double-block-length hash functions. Using the ideal cipher model, we prove that these hash functions, dubbed MJH, are asymptotically collision resistant up to query complexity for any in the iteration, where is the block size of the underlying blockcipher. When based on -bit key blockciphers, our construction, being of rate 1/2, provides better provable security than MDC-2, the only known construction of a rate-1/2 double-length hash function based on an -bit key blockcipher with non-trivial provable security. Moreover, since key scheduling is performed only once per message block for MJH, our proposal significantly outperforms MDC-2 in efficiency. When based on a -bit key blockcipher, we can use the extra bits of key to increase the amount of payload accordingly. Thus we get a rate-1 hash function that is much faster than existing proposals, such as Tandem-DM with comparable provable security. This is the full version of Lee and Stam (A faster alternative to MDC-2, 2011). | - |
dc.language | English | - |
dc.publisher | SPRINGER | - |
dc.title | MJH: a faster alternative to MDC-2 | - |
dc.type | Article | - |
dc.identifier.wosid | 000356360000003 | - |
dc.identifier.scopusid | 2-s2.0-84931571196 | - |
dc.type.rims | ART | - |
dc.citation.volume | 76 | - |
dc.citation.issue | 2 | - |
dc.citation.beginningpage | 179 | - |
dc.citation.endingpage | 205 | - |
dc.citation.publicationname | DESIGNS CODES AND CRYPTOGRAPHY | - |
dc.identifier.doi | 10.1007/s10623-014-9936-6 | - |
dc.contributor.localauthor | Lee, Jooyoung | - |
dc.contributor.nonIdAuthor | Stam, Martijn | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Hash function | - |
dc.subject.keywordAuthor | Blockcipher | - |
dc.subject.keywordAuthor | Provable security | - |
dc.subject.keywordAuthor | Collision resistance | - |
dc.subject.keywordPlus | LENGTH HASH FUNCTIONS | - |
dc.subject.keywordPlus | IDEAL-CIPHER MODEL | - |
dc.subject.keywordPlus | SECURITY/EFFICIENCY TRADEOFFS | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordPlus | CRYPTANALYSIS | - |
dc.subject.keywordPlus | CONSTRUCTIONS | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.