LSH: A New Fast Secure Hash Function Family

@inproceedings{Kim2014LSHAN,
  title={LSH: A New Fast Secure Hash Function Family},
  author={Dong-Chan Kim and Deukjo Hong and J. Lee and Woo-Hwan Kim and Daesung Kwon},
  booktitle={ICISC},
  year={2014}
}
  • Dong-Chan Kim, Deukjo Hong, +2 authors Daesung Kwon
  • Published in ICISC 2014
  • Computer Science
  • Since Wang’s attacks on the standard hash functions MD5 and SHA-1, design and analysis of hash functions have been studied a lot. NIST selected Keccak as a new hash function standard SHA-3 in 2012 and announced that Keccak was chosen because its design is different from MD5 and SHA-1/2 so that it could be secure against the attacks to them and Keccak ’s hardware efficiency is quite better than other SHA-3 competition candidates. However, software efficiency of Keccak is somewhat worse than… CONTINUE READING
    12 Citations

    Figures, Tables, and Topics from this paper.

    Compact Implementations of LSH
    • 3
    Cryptanalysis of the LSH hash functions
    Forward Secure Dynamic Searchable Symmetric Encryption with Efficient Updates
    • 53
    • PDF
    Parallel cryptographic hashing: Developments in the last 25 years
    • 2
    Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor
    Efficient Conversion Method from Arithmetic to Boolean Masking in Constrained Devices
    • 4
    • PDF
    Secure and light IoT protocol (SLIP) for anti-hacking
    • S. Hong
    • Computer Science
    • Journal of Computer Virology and Hacking Techniques
    • 2017
    • 2
    Fast Implementation of LSH With SIMD
    • 1
    • Highly Influenced

    References

    SHOWING 1-10 OF 50 REFERENCES
    Improved Indifferentiability Security Analysis of chopMD Hash Function
    • 55
    • PDF
    How to Break MD5 and Other Hash Functions
    • 1,469
    • Highly Influential
    • PDF
    The Skein Hash Function Family
    • 333
    • Highly Influential
    • PDF
    VLSI Characterization of the Cryptographic Hash Function BLAKE
    • 33
    • PDF
    Grøstl - a SHA-3 candidate
    • 279
    • PDF
    Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family
    • 138
    • PDF
    Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV
    • 363
    • Highly Influential
    • PDF
    Analysis of BLAKE2
    • 22
    • PDF