搜索结果: 1-7 共查到“Ideal-cipher model”相关记录7条 . 查询时间(0.062 秒)
The Collision Security of Tandem-DM in the Ideal Cipher Model
Collision Security Tandem-DM Cipher Model
font style='font-size:12px;'>
2012/12/3
We prove that Tandem-DM, which is one of the two “classical” schemes for turning a blockcipher of 2n-bit key into a double block length hash function, has birthday-type collision resistance in the ide...
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model
secret-key cryptography / Related-key attack Ideal-cipher model Blockcipher
font style='font-size:12px;'>
2012/3/28
Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers. They established sufficient conditions (output-unpredictability and collision-resistance) on ...
The Security of Abreast-DM in the Ideal Cipher Model
hash function provable security collision resistance
font style='font-size:12px;'>
2009/6/15
In this paper, we give a security proof for Abreast-DM in
terms of collision resistance, preimage resistance and adaptive preimage
resistance. As old as Tandem-DM, the compression function Abreast-
...
The Random Oracle Model and the Ideal Cipher Model are Equivalent
Random Oracle Model Ideal Cipher Model Equivalent
font style='font-size:12px;'>
2009/6/5
The Random Oracle Model and the Ideal Cipher Model are two well known idealised
models of computation for proving the security of cryptosystems. At Crypto 2005, Coron et al.
showed that security in ...
The Ideal-Cipher Model, Revisited:An Uninstantiable Blockcipher-Based Hash Function
Ideal-Cipher Model Information-Theoretic Cryptography Random-Oracle Model
font style='font-size:12px;'>
2009/2/17
The Ideal-Cipher Model of a blockcipher is a well-known and widely-used model
dating back to Shannon [24] and has seen frequent use in proving the security of various
cryptographic objects and proto...
A Practical Limit of Security Proof in the Ideal Cipher Model : Possibility of Using the Constant As a Trapdoor In Several Double Block Length Hash Functions
Hash Function Collision Attack Block Cipher
font style='font-size:12px;'>
2009/1/9
Recently, Shoichi Hirose [2] proposed several double block
length (DBL) hash functions. Each DBL hash function uses a constant
which has a role to make the DBL hash function collision-resistant in
...
The Collision Intractability of MDC-2 in the Ideal Cipher Model
Collision Intractability MDC-2 Ideal Cipher Model
font style='font-size:12px;'>
2008/12/16
The Collision Intractability of MDC-2 in the Ideal Cipher Model.