{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:17:17Z","timestamp":1725794237130},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067339"},{"type":"electronic","value":"9783319067346"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06734-6_26","type":"book-chapter","created":{"date-parts":[[2014,5,21]],"date-time":"2014-05-21T04:22:02Z","timestamp":1400646122000},"page":"440-458","source":"Crossref","is-referenced-by-count":4,"title":["Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions"],"prefix":"10.1007","author":[{"given":"Farzaneh","family":"Abed","sequence":"first","affiliation":[]},{"given":"Christian","family":"Forler","sequence":"additional","affiliation":[]},{"given":"Eik","family":"List","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Lucks","sequence":"additional","affiliation":[]},{"given":"Jakob","family":"Wenzel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/978-3-642-25385-0_13","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2011","author":"F. Armknecht","year":"2011","unstructured":"Armknecht, F., Fleischmann, E., Krause, M., Lee, J., Stam, M., Steinberger, J.: The Preimage Security of Double-Block-Length Compression Functions. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol.\u00a07073, pp. 233\u2013251. Springer, Heidelberg (2011)"},{"key":"26_CR2","unstructured":"Aumasson, J.-P., Henzen, L., Meier, W., Phan, R.C.-W.: SHA-3 proposal BLAKE. Submission to NIST, Round 3 (2010)"},{"key":"26_CR3","unstructured":"Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Sponge functions. Ecrypt Hash Workshop (May 2007)"},{"key":"26_CR4","unstructured":"Biham, E., Dunkelman, O.: The SHAvite-3 Hash Function. Submission to NIST, Round 2 (2009)"},{"key":"26_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/3-540-45708-9_21","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"J.A. Black","year":"2002","unstructured":"Black, J.A., Rogaway, P., Shrimpton, T.: Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 320\u2013335. Springer, Heidelberg (2002)"},{"key":"26_CR6","unstructured":"Meyer, C., Matyas, S.: Secure Program Load With Manipulation Detection Code (1988)"},{"issue":"9","key":"26_CR7","doi-asserted-by":"publisher","first-page":"2607","DOI":"10.1093\/ietfec\/e91-a.9.2607","volume":"91","author":"D. Chang","year":"2008","unstructured":"Chang, D., Nandi, M., Lee, J., Sung, J., Hong, S., Lim, J., Park, H., Chun, K.: Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function. IEICE Transactions\u00a091-A(9), 2607\u20132614 (2008)","journal-title":"IEICE Transactions"},{"key":"26_CR8","unstructured":"Coppersmith, D., Pilpel, S., Meyer, C.H., Matyas, S.M., Hyden, M.M., Oseas, J., Brachtl, B., Schilling, M.: Data Authentication Using Modification Dectection Codes Based on a Public One-Way Encryption Function. U.S. Patent No. 4,908,861 (March 13, 1990)"},{"key":"26_CR9","unstructured":"Ewan Fleischmann. Analysis and Design of Blockcipher Based Cryptographic Algorithms. PhD thesis, Bauhaus-Universit\u00e4t Weimar (2013)"},{"key":"26_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1007\/978-3-642-16280-0_7","volume-title":"Provable Security","author":"E. Fleischmann","year":"2010","unstructured":"Fleischmann, E., Forler, C., Gorski, M., Lucks, S.: Collision-Resistant Double-Length Hashing. In: Heng, S.-H., Kurosawa, K. (eds.) ProvSec 2010. LNCS, vol.\u00a06402, pp. 102\u2013118. Springer, Heidelberg (2010)"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Fleischmann, E., Forler, C., Lucks, S.: The Collision Security of MDC-4. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol.\u00a07374, pp. 252\u2013269. Springer, Heidelberg (2012)","DOI":"10.1007\/978-3-642-31410-0_16"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-642-31448-3_12","volume-title":"Information Security and Privacy","author":"E. Fleischmann","year":"2012","unstructured":"Fleischmann, E., Forler, C., Lucks, S., Wenzel, J.: Weimar-DM: A Highly Secure Double-Length Compression Function. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol.\u00a07372, pp. 152\u2013165. Springer, Heidelberg (2012)"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Fleischmann, E., Gorski, M., Lucks, S.: On the Security of Tandem-DM. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 84\u2013103. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-03317-9_6"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Fleischmann, E., Gorski, M., Lucks, S.: Security of Cyclic Double Block Length Hash Functions. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol.\u00a05921, pp. 153\u2013175. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-10868-6_10"},{"key":"26_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/978-3-540-40974-8_23","volume-title":"Cryptography and Coding","author":"M. Hattori","year":"2003","unstructured":"Hattori, M., Hirose, S., Yoshida, S.: Analysis of Double Block Length Hash Functions. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol.\u00a02898, pp. 290\u2013302. Springer, Heidelberg (2003)"},{"key":"26_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/11496618_24","volume-title":"Information Security and Cryptology \u2013 ICISC 2004","author":"S. Hirose","year":"2005","unstructured":"Hirose, S.: Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. In: Park, C., Chee, S. (eds.) ICISC 2004. LNCS, vol.\u00a03506, pp. 330\u2013342. Springer, Heidelberg (2005)"},{"key":"26_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/11799313_14","volume-title":"Fast Software Encryption","author":"S. Hirose","year":"2006","unstructured":"Hirose, S.: Some Plausible Constructions of Double-Block-Length Hash Functions. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 210\u2013225. Springer, Heidelberg (2006)"},{"key":"26_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/11799313_14","volume-title":"Fast Software Encryption","author":"S. Hirose","year":"2006","unstructured":"Hirose, S.: Some Plausible Constructions of Double-Block-Length Hash Functions. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol.\u00a04047, pp. 210\u2013225. Springer, Heidelberg (2006)"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Hohl, W., Lai, X., Meier, T., Waldvogel, C.: Security of Iterated Hash Functions Based on Block Ciphers. In: Stinson, D.R. (ed.) Advances in Cryptology - CRYPTO 1993. LNCS, vol.\u00a0773, pp. 379\u2013390. Springer, Heidelberg (1994)","DOI":"10.1007\/3-540-48329-2_32"},{"key":"26_CR20","unstructured":"ISO\/IEC. ISO DIS 10118-2: Information technology - Security techniques - Hash-functions, Part 2: Hash-functions using an n-bit block cipher algorithm. First released in 1992 (2000)"},{"issue":"1","key":"26_CR21","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s001459900035","volume":"11","author":"L.R. Knudsen","year":"1998","unstructured":"Knudsen, L.R., Lai, X., Preneel, B.: Attacks on Fast Double Block Length Hash Functions. J. Cryptology\u00a011(1), 59\u201372 (1998)","journal-title":"J. Cryptology"},{"key":"26_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"462","DOI":"10.1007\/11593447_25","volume-title":"Advances in Cryptology - ASIACRYPT 2005","author":"L.R. Knudsen","year":"2005","unstructured":"Knudsen, L.R., Muller, F.: Some Attacks Against a Double Length Hash Proposal. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol.\u00a03788, pp. 462\u2013473. Springer, Heidelberg (2005)"},{"key":"26_CR23","first-page":"519","volume":"2010","author":"M. Krause","year":"2010","unstructured":"Krause, M., Armknecht, F., Fleischmann, E.: Preimage Resistance Beyond the Birthday Bound: Double-Length Hashing Revisited. IACR Cryptology ePrint Archive\u00a02010, 519 (2010)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Lai, X., Massey, J.L.: Hash Functions Based on Block Ciphers. In: Rueppel, R.A. (ed.) Advances in Cryptology - EUROCRYPT1992. LNCS, vol.\u00a0658, pp. 55\u201370. Springer, Heidelberg (1993)","DOI":"10.1007\/3-540-47555-9_5"},{"key":"26_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1007\/978-3-642-34961-4_31","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"J. Lee","year":"2012","unstructured":"Lee, J.: Provable Security of the Knudsen-Preneel Compression Functions. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol.\u00a07658, pp. 504\u2013525. Springer, Heidelberg (2012)"},{"key":"26_CR26","unstructured":"Lee, J., Kwon, D.: The Security of Abreast-DM in the Ideal Cipher Model. Cryptology ePrint Archive, Report 2009\/225 (2009), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"issue":"1","key":"26_CR27","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1587\/transfun.E94.A.104","volume":"94","author":"J. Lee","year":"2011","unstructured":"Lee, J., Kwon, D.: The Security of Abreast-DM in the Ideal Cipher Model. IEICE Transactions\u00a0 94-A(1), 104\u2013109 (2011)","journal-title":"IEICE Transactions"},{"key":"26_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-642-19074-2_15","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"J. Lee","year":"2011","unstructured":"Lee, J., Stam, M.: MJH: A Faster Alternative to MDC-2. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol.\u00a06558, pp. 213\u2013236. Springer, Heidelberg (2011)"},{"key":"26_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-642-22792-9_32","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"J. Lee","year":"2011","unstructured":"Lee, J., Stam, M., Steinberger, J.: The Collision Security of Tandem-DM in the Ideal Cipher Model. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol.\u00a06841, pp. 561\u2013577. Springer, Heidelberg (2011)"},{"issue":"9","key":"26_CR30","doi-asserted-by":"publisher","first-page":"6165","DOI":"10.1109\/TIT.2012.2204530","volume":"58","author":"J. Lee","year":"2012","unstructured":"Lee, J., Steinberger, J.P.: Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation. IEEE Transactions on Information Theory\u00a058(9), 6165\u20136182 (2012)","journal-title":"IEEE Transactions on Information Theory"},{"key":"26_CR31","unstructured":"Lucks, S.: A Collision-Resistant Rate-1 Double-Block-Length Hash Function. In: Symmetric Cryptography (2007)"},{"key":"26_CR32","first-page":"238","volume":"2011","author":"Y. Luo","year":"2011","unstructured":"Luo, Y., Lai, X.: Attacks On a Double Length Blockcipher-based Hash Proposal. IACR Cryptology ePrint Archive\u00a02011, 238 (2011)","journal-title":"IACR Cryptology ePrint Archive"},{"key":"26_CR33","unstructured":"Rabin, M.: Digitalized Signatures. In: De Millo, R., Dobkin, D., Jones, A., Lipton, R. (eds.) Foundations of Secure Computation, pp. 155\u2013168. Academic Press (1978)"},{"key":"26_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1007\/978-3-642-34961-4_32","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2012","author":"B. Mennink","year":"2012","unstructured":"Mennink, B.: Optimal Collision Security in Double Block Length Hashing with Single Length Key. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol.\u00a07658, pp. 526\u2013543. Springer, Heidelberg (2012)"},{"key":"26_CR35","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: One Way Hash Functions and DES. In: Brassard, G. (ed.) Advances in Cryptology - CRYPT0 1989. LNCS, vol.\u00a0435, pp. 428\u2013446. Springer, Heidelberg (1990)","DOI":"10.1007\/0-387-34805-0_40"},{"key":"26_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/11502760_16","volume-title":"Fast Software Encryption","author":"M. Nandi","year":"2005","unstructured":"Nandi, M., Lee, W.I., Sakurai, K., Lee, S.-J.: Security Analysis of a 2\/3-Rate Double Length Compression Function in the Black-Box Model. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 243\u2013254. Springer, Heidelberg (2005)"},{"key":"26_CR37","unstructured":"Ferguson, N., Lucks, S., Schneier, B., Whiting, D., Bellare, M., Kohno, T., Callas, J., Walker, J.: Skein Source Code and Test Vectors, \n                    \n                      http:\/\/www.skein-hash.info\/downloads"},{"key":"26_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-3-642-10868-6_11","volume-title":"Cryptography and Coding","author":"O. \u00d6zen","year":"2009","unstructured":"\u00d6zen, O., Stam, M.: Another Glance at Double-Length Hashing. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol.\u00a05921, pp. 176\u2013201. Springer, Heidelberg (2009)"},{"key":"26_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/11935230_21","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2006","author":"T. Peyrin","year":"2006","unstructured":"Peyrin, T., Gilbert, H., Muller, F., Robshaw, M.J.B.: Combining Compression Functions and Block Cipher-Based Hash Functions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol.\u00a04284, pp. 315\u2013331. Springer, Heidelberg (2006)"},{"key":"26_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-3-540-25937-4_24","volume-title":"Fast Software Encryption","author":"P. Rogaway","year":"2004","unstructured":"Rogaway, P., Shrimpton, T.: Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 371\u2013388. Springer, Heidelberg (2004)"},{"key":"26_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-540-85174-5_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"P. Rogaway","year":"2008","unstructured":"Rogaway, P., Steinberger, J.P.: Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 433\u2013450. Springer, Heidelberg (2008)"},{"key":"26_CR42","unstructured":"Satoh, T., Haga, M., Kurosawa, K.: Towards Secure and Fast Hash Functions. TIEICE: IEICE Transactions on Communications\/Electronics\/Information and Systems (1999)"},{"key":"26_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/978-3-540-85174-5_22","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"M. Stam","year":"2008","unstructured":"Stam, M.: Beyond Uniformity: Better Security\/Efficiency Tradeoffs for Compression Functions. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 397\u2013412. Springer, Heidelberg (2008)"},{"key":"26_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-642-03317-9_5","volume-title":"Fast Software Encryption","author":"M. Stam","year":"2009","unstructured":"Stam, M.: Blockcipher-Based Hashing Revisited. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol.\u00a05665, pp. 67\u201383. Springer, Heidelberg (2009)"},{"key":"26_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-540-72540-4_3","volume-title":"Advances in Cryptology - EUROCRYPT 2007","author":"J.P. Steinberger","year":"2007","unstructured":"Steinberger, J.P.: The Collision Intractability of MDC-2 in the Ideal Cipher Model. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol.\u00a04515, pp. 34\u201351. Springer, Heidelberg (2007)"},{"key":"26_CR46","doi-asserted-by":"crossref","unstructured":"Robert, S., Winternitz: A Secure One-Way Hash Function Built from DES. In: IEEE Symposium on Security and Privacy, pp. 88\u201390 (1984)","DOI":"10.1109\/SP.1984.10027"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2014"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06734-6_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T21:47:47Z","timestamp":1558907267000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06734-6_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067339","9783319067346"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06734-6_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}