Security of permutation-based compression function lp231

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 654
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLee, Jooyoungko
dc.contributor.authorKwon, Daesungko
dc.date.accessioned2016-09-06T08:58:05Z-
dc.date.available2016-09-06T08:58:05Z-
dc.date.created2016-08-05-
dc.date.created2016-08-05-
dc.date.created2016-08-05-
dc.date.created2016-08-05-
dc.date.issued2014-07-
dc.identifier.citationINFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381-
dc.identifier.issn0020-0190-
dc.identifier.urihttp://hdl.handle.net/10203/212443-
dc.description.abstractIn this paper, we study security of a certain class of permutation-based compression functions. Denoted by lp231 in [10], they are 2n-to-n-bit compression functions using three calls to a single n-bit random permutation. We prove that lp231 is asymptotically preimage resistant up to 2(2n/3)/n query complexity and collision resistant up to 2(n/2)/n(1+epsilon) query complexity for any epsilon > 0. Based on a single permutation, lp231 provides both efficiency and almost optimal collision security. (C) 2014 Elsevier B.V. All rights reserved.-
dc.languageEnglish-
dc.publisherELSEVIER SCIENCE BV-
dc.titleSecurity of permutation-based compression function lp231-
dc.typeArticle-
dc.identifier.wosid000334974100008-
dc.identifier.scopusid2-s2.0-84896779482-
dc.type.rimsART-
dc.citation.volume114-
dc.citation.issue7-
dc.citation.beginningpage372-
dc.citation.endingpage381-
dc.citation.publicationnameINFORMATION PROCESSING LETTERS-
dc.identifier.doi10.1016/j.ipl.2014.02.008-
dc.contributor.localauthorLee, Jooyoung-
dc.contributor.nonIdAuthorKwon, Daesung-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorCryptography-
dc.subject.keywordAuthorHash function-
dc.subject.keywordAuthorCollision resistance-
dc.subject.keywordAuthorPreimage resistance-
dc.subject.keywordAuthorRandom permutation model-
dc.subject.keywordAuthorProvable security-
dc.subject.keywordPlusLENGTH HASH FUNCTIONS-
dc.subject.keywordPlusSECURITY/EFFICIENCY TRADEOFFS-
dc.subject.keywordPlusCONSTRUCTIONS-
dc.subject.keywordPlusMODEL-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0