In this article, it is discussed how to construct a compression function with 2n-bit output using a component function with n-bit output. The component function is either a smaller compression function or a block cipher. Some constructions are presented which compose collision-resistant hash functions: Any collision-finding attack on them is at most as efficient as the birthday attack in the random oracle model or in the ideal cipher model. A new security notion is also introduced, which we call indistinguishability in the iteration, with a construction satisfying the notion. © International Association for Cryptologic Research 2006.
CITATION STYLE
Hirose, S. (2006). Some plausible constructions of double-block-length hash functions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4047 LNCS, pp. 210–225). Springer Verlag. https://doi.org/10.1007/11799313_14
Mendeley helps you to discover research relevant for your work.