DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Jooyoung | ko |
dc.contributor.author | Kwon, Daesung | ko |
dc.date.accessioned | 2016-09-06T08:58:05Z | - |
dc.date.available | 2016-09-06T08:58:05Z | - |
dc.date.created | 2016-08-05 | - |
dc.date.created | 2016-08-05 | - |
dc.date.created | 2016-08-05 | - |
dc.date.created | 2016-08-05 | - |
dc.date.issued | 2014-07 | - |
dc.identifier.citation | INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381 | - |
dc.identifier.issn | 0020-0190 | - |
dc.identifier.uri | http://hdl.handle.net/10203/212443 | - |
dc.description.abstract | In this paper, we study security of a certain class of permutation-based compression functions. Denoted by lp231 in [10], they are 2n-to-n-bit compression functions using three calls to a single n-bit random permutation. We prove that lp231 is asymptotically preimage resistant up to 2(2n/3)/n query complexity and collision resistant up to 2(n/2)/n(1+epsilon) query complexity for any epsilon > 0. Based on a single permutation, lp231 provides both efficiency and almost optimal collision security. (C) 2014 Elsevier B.V. All rights reserved. | - |
dc.language | English | - |
dc.publisher | ELSEVIER SCIENCE BV | - |
dc.title | Security of permutation-based compression function lp231 | - |
dc.type | Article | - |
dc.identifier.wosid | 000334974100008 | - |
dc.identifier.scopusid | 2-s2.0-84896779482 | - |
dc.type.rims | ART | - |
dc.citation.volume | 114 | - |
dc.citation.issue | 7 | - |
dc.citation.beginningpage | 372 | - |
dc.citation.endingpage | 381 | - |
dc.citation.publicationname | INFORMATION PROCESSING LETTERS | - |
dc.identifier.doi | 10.1016/j.ipl.2014.02.008 | - |
dc.contributor.localauthor | Lee, Jooyoung | - |
dc.contributor.nonIdAuthor | Kwon, Daesung | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | Cryptography | - |
dc.subject.keywordAuthor | Hash function | - |
dc.subject.keywordAuthor | Collision resistance | - |
dc.subject.keywordAuthor | Preimage resistance | - |
dc.subject.keywordAuthor | Random permutation model | - |
dc.subject.keywordAuthor | Provable security | - |
dc.subject.keywordPlus | LENGTH HASH FUNCTIONS | - |
dc.subject.keywordPlus | SECURITY/EFFICIENCY TRADEOFFS | - |
dc.subject.keywordPlus | CONSTRUCTIONS | - |
dc.subject.keywordPlus | MODEL | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.