2014 Ninth Asia Joint Conference on Information Security 2014
DOI: 10.1109/asiajcis.2014.27
|View full text |Cite
|
Sign up to set email alerts
|

A New (n, n) Blockcipher Hash Function: Apposite for Short Messages

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2016
2016
2016
2016

Publication Types

Select...
2
1

Relationship

3
0

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…Usually, the ICM is used as a model for the security proof, that depends on the ideal environment [3]- [5], [11], [12], [14], [16], [23], [24], [34]. However, the ICM is far away from the real world scenario [29], [34].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Usually, the ICM is used as a model for the security proof, that depends on the ideal environment [3]- [5], [11], [12], [14], [16], [23], [24], [34]. However, the ICM is far away from the real world scenario [29], [34].…”
Section: Resultsmentioning
confidence: 99%
“…It is widely used in the digital signatures, message authentication, password verification and file/data identifier [1]- [4], [21], [24]. It consists of a compression function, where the blockcipher or scratch can be used [3], [4], [14]- [16]. Therefore, the blockcipher compression function is being focused here because of better security bound and higher efficiency than that of the scratch based compression function [5]- [10].…”
Section: Introductionmentioning
confidence: 99%
“…Now-a-days, the importance of an efficient blockcipher compression function are enormous [6,8,13,33,34,40,41,44]. The blockcipher is one of the important cryptographic primitive for the security solution of IoT environment according to certain standards such as ISO/IEC29192-1, ISO/IEC29192-2, ISO/IEC29192-3, and ISO/IEC29192-4, [42][43][44].…”
Section: Namementioning
confidence: 99%
“…[2,6,8,34] Usually, the blockcipher based compression function is classified as single blocklength (SBL) and double block-length (DBL). Due to short size of output, the application of SBL is limited now [2,9,33]. On the other hand, the DBL is more reliable construction due to its better resistance against birthday attack [2,13,16,18,21].…”
Section: Introductionmentioning
confidence: 99%
“…The blockcipher‐based compression function is more considerable than the scratch‐based scheme because of consideration of low‐cost and adversarial attacks . Furthermore, it is preferable to direct implement of blockciper rather than the encryption function .…”
Section: Introductionmentioning
confidence: 99%