Security Analysis of the Mode of JH Hash Function


Recently, NIST has selected 14 second round candidates of SHA3 competition. One of these candidates will win the competition and eventually become the new hash function standard. In TCC’04, Maurer et al introduced the notion of indifferentiability as a generalization of the concept of the indistinguishability of two systems. Indifferentiability is the… (More)
DOI: 10.1007/978-3-642-13858-4_10
View Slides


  • Presentations referencing similar topics