Hash Functions Based on Block Ciphers: A Synthetic Approach

@inproceedings{Preneel1993HashFB,
  title={Hash Functions Based on Block Ciphers: A Synthetic Approach},
  author={Bart Preneel and Ren{\'e} Govaerts and Joos Vandewalle},
  booktitle={CRYPTO},
  year={1993}
}
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is approximately equal to the block length. A general model is presented, and it is shown that this model covers 9 schemes that have appeared in the literature. Within this general model 64 possible schemes exist, and it is shown that 12 of these are secure; they can be reduced to 2 classes based on linear transformations of… CONTINUE READING
Highly Influential
This paper has highly influenced 24 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 236 extracted citations

The Hash Function BLAKE

Information Security and Cryptography • 2014
View 5 Excerpts
Highly Influenced

Advances in Cryptology – CRYPTO 2013

Lecture Notes in Computer Science • 2013
View 9 Excerpts
Highly Influenced

More Insights on Blockcipher-Based Hash Functions

IACR Cryptology ePrint Archive • 2010
View 4 Excerpts
Highly Influenced

Analysis of the Hash Function Design Strategy Called SMASH

IEEE Transactions on Information Theory • 2008
View 5 Excerpts
Highly Influenced

On High-Rate Cryptographic Compression Functions

IACR Cryptology ePrint Archive • 2005
View 7 Excerpts
Highly Influenced

References

Publications referenced by this paper.
Showing 1-10 of 29 references

Cryptographic hash functions

European Transactions on Telecommunications • 1994
View 3 Excerpts

Information technologySecurity techniquesHashfunctionsPart 1 : General and Part 2 : Hashfunctions using an nbit block cipher algorithm

D. R. Stinson
Appeared in Advances in Cryptology – CRYPTO 1993 , Lecture Notes in Computer Science • 1993

Digital signatures

G. J. Simmons
Contemporary Cryptology : The Science of Information Integrity • 1991

A fast software one-way hash function

Journal of Cryptology • 1990
View 1 Excerpt

Similar Papers

Loading similar papers…