The Security of Abreast-DM in the Ideal Cipher Model

Cited 20 time in webofscience Cited 0 time in scopus
  • Hit : 569
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, Jooyoungko
dc.contributor.authorKwon, Daesungko
dc.date.accessioned2016-09-07T01:09:44Z-
dc.date.available2016-09-07T01:09:44Z-
dc.date.created2016-08-09-
dc.date.created2016-08-09-
dc.date.created2016-08-09-
dc.date.issued2011-01-
dc.identifier.citationIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E94A, no.1, pp.104 - 109-
dc.identifier.issn0916-8508-
dc.identifier.urihttp://hdl.handle.net/10203/212513-
dc.description.abstractAs old as TANDEM-DM, the compression function ABREAST-DM is one of the most well-known constructions for double block length compression functions. In this paper, we give a security proof for ABREAST-DM in terms of collision resistance and preimage resistance. The bounds on the number of queries for collision resistance and preimage resistance are given by Omega(2(n)). Based on a novel technique using query-response cycles, our security proof is simpler than those for MDC-2 and TANDEM-DM. We also present a wide class of ABREAST-DM variants that enjoy a birthday-type security guarantee with a simple proof*.-
dc.languageEnglish-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.titleThe Security of Abreast-DM in the Ideal Cipher Model-
dc.typeArticle-
dc.identifier.wosid000293818300012-
dc.identifier.scopusid2-s2.0-78650955277-
dc.type.rimsART-
dc.citation.volumeE94A-
dc.citation.issue1-
dc.citation.beginningpage104-
dc.citation.endingpage109-
dc.citation.publicationnameIEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES-
dc.identifier.doi10.1587/transfun.E94.A.104-
dc.contributor.localauthorLee, Jooyoung-
dc.contributor.nonIdAuthorKwon, Daesung-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorhash function-
dc.subject.keywordAuthorblockcipher-
dc.subject.keywordAuthorcollision resistance-
dc.subject.keywordPlusLENGTH HASH FUNCTIONS-
dc.subject.keywordPlusSECURITY/EFFICIENCY TRADEOFFS-
dc.subject.keywordPlusCONSTRUCTIONS-
dc.subject.keywordPlusCOLLISIONS-
dc.subject.keywordPlusSHA-1-
dc.subject.keywordPlusMD4-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 20 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0