2015 IEEE 29th International Conference on Advanced Information Networking and Applications 2015
DOI: 10.1109/aina.2015.237
|View full text |Cite
|
Sign up to set email alerts
|

A New (n, 2n) Double Block Length Hash Function Based on Single Key Scheduling

Abstract: In this paper we propose a double block length hash function called MR-MMO. Our scheme satisfies two calls of (n, 2n) blockcipher and can compress 3n bits to 2n bits (n = 128 bits). The Collision Resistance (CR) and Preimage Resistance (PR) of MR-MMO are respectively 2 126.70 and 2 252.5 . Surprisingly, the collision security bound of our scheme is the best in compare with other existing schemes. We use a single key scheduling for each compression function which is great in respect of cost and time. Additional… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
13
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3
3

Relationship

5
1

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…The scheme of Hirose delivers marginal security bound as q = 2 124.55 but it ensures a single key scheduling. However, the CR and P R bound of the Tandem-DM and Abreast-DM are not satisfactory as that of the MR, Weimar, and Hirose [23]. Moreover, the efficiencyrate of Tandem-DM and Abreast-DM is 1/2 like MR, Weimar, and Hirose [6,11,12].…”
Section: Namementioning
confidence: 93%
See 2 more Smart Citations
“…The scheme of Hirose delivers marginal security bound as q = 2 124.55 but it ensures a single key scheduling. However, the CR and P R bound of the Tandem-DM and Abreast-DM are not satisfactory as that of the MR, Weimar, and Hirose [23]. Moreover, the efficiencyrate of Tandem-DM and Abreast-DM is 1/2 like MR, Weimar, and Hirose [6,11,12].…”
Section: Namementioning
confidence: 93%
“…CR KS r # E OM MR [23,31] Motivation. The parameters of CR, P R, r, #E, OM , and KS are vital for any satisfactory scheme of blockcipher based compression function [1, 6-8, 13, 21].…”
Section: Namementioning
confidence: 99%
See 1 more Smart Citation
“…However, Liscov point out the issue of the weak ideal compression function independently at first in 2006 [19], where the adversary is allowed to make total three types of query such as E f , E b and E k (key-disclosure query). Therefore, the adversary of WCM is stronger than that of the ICM (details in [17], [19], [20] [31] 3n…”
Section: Introductionmentioning
confidence: 99%
“…On the contrary, the Weimar-DM needs multiple key scheduling (Table 1). Usually, the number of gates will be increased if any scheme needs multiple key scheduling (details in [10], [31]). The efficiency rate of the Nandi and ISA-09 are 2/3 but the collision security bound are less than that of the Weimar and Hirose-DM [3], [4].…”
Section: Introductionmentioning
confidence: 99%