On hashing with tweakable ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security analysis of the hash to that of the cipher, and to minimize the hardware size. Well known hash constructs are used in international standards like MD5 and SHA-1. Recently, researchers proposed new modes of...
Saved in:
Main Authors: | , |
---|---|
Format: | Default Conference proceeding |
Published: |
2009
|
Subjects: | |
Online Access: | https://hdl.handle.net/2134/5684 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|