Loading...
conference paper
Beyond uniformity: Better security/efficiency tradeoffs for compression functions
Stam, Martijn
2008
Advances In Cryptology - Crypto 2008, Proceedings
Suppose we are given a perfect n + c-to-n bit compression function f and we want to construct a larger m + s-to-s bit compression function H instead. What level of security, in particular collision resistance, can we expect from H if it makes r calls to f? We conjecture that typically collisions can be found in 2((nr+cr-m)/(r+1)) queries. This bound is also relevant for building a m + s-to-s bit compression function based on a blockcipher with k-bit keys and n-bit blocks: simply set c = k, or c = 0 in case of fixed keys.
Type
conference paper
Web of Science ID
WOS:000259488300022
Authors
Stam, Martijn
Publication date
2008
Published in
Advances In Cryptology - Crypto 2008, Proceedings
ISBN of the book
978-3-540-85173-8
Series title/Series vol.
Lecture Notes In Computer Science; 5157
Start page
397
End page
412
Peer reviewed
REVIEWED
Written at
EPFL
EPFL units
Event name | Event place | Event date |
Santa Barbara, CA | Aug 17-21, 2008 | |
Available on Infoscience
November 30, 2010
Use this identifier to reference this record