{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T02:40:08Z","timestamp":1748832008102,"version":"3.41.0"},"reference-count":34,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2016]]},"DOI":"10.1587\/transinf.2015icp0028","type":"journal-article","created":{"date-parts":[[2016,3,31]],"date-time":"2016-03-31T22:20:55Z","timestamp":1459462855000},"page":"796-804","source":"Crossref","is-referenced-by-count":3,"title":["A New Scheme of Blockcipher Hash"],"prefix":"10.1587","volume":"E99.D","author":[{"given":"Rashed","family":"MAZUMDER","sequence":"first","affiliation":[{"name":"JAIST"}]},{"given":"Atsuko","family":"MIYAJI","sequence":"additional","affiliation":[{"name":"JAIST"},{"name":"Graduate School of Engineering, Osaka University"},{"name":"Japan Science and Technology Agency (JST) CREST"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography, 5th ed, ISBN: 0-8493-8523-7, CRC Press, 1996."},{"key":"2","unstructured":"[2] A. Bogdanov, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, and Y. Seurin, \u201cHash functions and RFID tags: Mind the gap,\u201d LNCS, CHES, vol.5154, pp.283-299, 2008."},{"key":"3","unstructured":"[3] E. Fleischmann, C. Forler, S. Lucks, and J. Wenzel, \u201cWeimar-DM: A Highly Secure Double-Length Compression Function,\u201d LNCS, ACISP, vol.7372, pp.152-165, 2012."},{"key":"4","unstructured":"[4] S. Hirose, \u201cSome Plausible Constructions of Double-Block-Length Hash Functions,\u201d LNCS, FSE, vol.4047, pp.210-225, 2006."},{"key":"5","unstructured":"[5] Y. Dodis, T. Ristenpart, and T. Shrimpton, \u201cSalvaging Merkle-Damgard for Practical Applications,\u201d LNCS, EUROCRYPT, vol.5479, pp.371-388, 2009."},{"key":"6","unstructured":"[6] J.-S. Coron, Y. Dodis, C. Malinaud, and P. Puniya, \u201cMerkle-Damgard Revisited: How to Construct a Hash Function,\u201d LNCS, CRYPTO, vol.3621, pp.430-448, 2005."},{"key":"7","unstructured":"[7] X. Wang, X. Lai, D. Feng, H. Chen, and X. Yu, \u201cCryptanalysis of the Hash Functions MD4 and RIPEMD,\u201d LNCS, EUROCRYPT, vol.3494, pp.1-18, 2005."},{"key":"8","unstructured":"[8] X. Wang, Y.L. Yin, and H. Yu, \u201cFinding Collisions in the Full SHA-1,\u201d LNCS, CRYPTO, vol.3621, pp.17-36, 2005."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] J.-P. Kaps and B. Sunar, \u201cEnergy Comparison of AES and SHA-1 for Ubiquitous Computing,\u201d LNCS, Emerging Directions in Embedded and Ubiquitous Computing, vol.4097, pp.372-381, 2006.","DOI":"10.1007\/11807964_38"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] J. Lee, K. Kapitanova, and S.H. Son, \u201cThe price of security in wireless sensor networks,\u201d ELSEVIER, Computer Network, vol.54, no.17, pp.2967-2978, Dec. 2010.","DOI":"10.1016\/j.comnet.2010.05.011"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] X. Lai and J.L. Massey, \u201cHash function based on block ciphers,\u201d LNCS, EUROCRYPT, vol.658, pp.55-70, 1992.","DOI":"10.1007\/3-540-47555-9_5"},{"key":"12","unstructured":"[12] J. Lee and M. Stam, \u201cMJH: A Faster Alternative to MDC-2,\u201d LNCS, CT-RSA, vol.6558, pp.213-236, 2011."},{"key":"13","unstructured":"[13] B. Mennink, \u201cOptimal Collision Security in Double Block Length Hashing with Single Length Key,\u201d LNCS, ASIACRYPT, vol.7658, pp.526-543, 2012."},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] A. Miyaji, M. Rashed, and T. Sawada, \u201cA New (n, n) Blockcipher Hash Function: Apposite for Short Messages,\u201d IEEE, ASIAJCIS, 978-1-4799-5733, pp.56-63, 2014.","DOI":"10.1109\/AsiaJCIS.2014.27"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] J. Lee and D. Kwon, \u201cThe Security of Abreast-DM in the Ideal Cipher Model,\u201d IEICE Transactions, vol.E94-A, no.1, pp.104-109, 2011.","DOI":"10.1587\/transfun.E94.A.104"},{"key":"16","unstructured":"[16] J. Lee, M. Stam, and J. Steinberger, \u201cThe Collision Security of Tandem-DM in the Ideal Cipher Model,\u201d LNCS, CRYPTO, vol.6841, pp.561-577, 2011."},{"key":"17","unstructured":"[17] J. Black, P. Rogaway, and T. Shrimpton, \u201cBlack-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV,\u201d LNCS, CRYPTO, vol.2442, pp.320-335, 2002."},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] J. Black, P. Rogaway, T. Shrimpton, and M. Stam, \u201cAn Analysis of the Blockcipher-Based Hash Functions from PGV,\u201d LNCS, J.CRYPTOL, vol.23, no.4, pp.519-545, 2010.","DOI":"10.1007\/s00145-010-9071-0"},{"key":"19","unstructured":"[19] M. Liscov, \u201cConstructing an ideal hash function from weak ideal compression function,\u201d LNCS, selected areas in cryptography, vol.4356, pp.358-375, 2006."},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] S. Hirose and H. Kuwakado., \u201cCollision Resistance of Hash Functions in a Weak Ideal Cipher Model,\u201d IEICE Transactions, vol.E95-A, no.1, pp.252-255, 2012.","DOI":"10.1587\/transfun.E95.A.252"},{"key":"21","unstructured":"[21] O. Ozen and M. Stam, \u201cAnother Glance at Double-Length Hashing,\u201d LNCS, Cryptography and Coding, vol.5291, pp.176-201, 2009."},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] C.E. Shannon, \u201cCommunication Theory of Secrecy Systems,\u201d Bell Systems Technical Journal, vol.28, no.4, pp.656-715, 1949.","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"23","unstructured":"[23] M. Nandi, W. Lee, K. Sakurai, and S. Lee, \u201cSecurity Analysis of a 2\/3-Rate Double Length Compression Function in the Black-Box Model,\u201d LNCS, FSE, vol.3557, pp.243-254, 2005."},{"key":"24","unstructured":"[24] J. Lee, S. Hong, J. Sung, and H. Park, \u201cA New Double-Block-Length Hash Function Using Feistel Structure,\u201d LNCS, ISA, vol.5576, pp.11-20, 2009."},{"key":"25","unstructured":"[25] F. Armknecht, E. Fleischmann, M. Krause, J. Lee, M. Stam, and J. Steinberger, \u201cThe Preimage Security of Double-Block-Length Compression Functions,\u201d LNCS, ASIACRYPT, vol.7073, pp.233-251, 2011."},{"key":"26","unstructured":"[26] E. Fleischmann, C. Forler, and S. Lucks, \u201cThe Collision Security of MDC-4,\u201d LNCS, Africacrypt, vol.7374, pp.272-269, 2012."},{"key":"27","unstructured":"[27] M. Stam, \u201cBlockcipher-Based Hashing Revisited,\u201d LNCS, FSE, vol.5665, pp.67-83, 2009."},{"key":"28","unstructured":"[28] J.P. Steinberger, \u201cThe Collision Intractability of MDC-2 in the Ideal-Cipher Model,\u201d LNCS, Eurocrypt, vol.4515, pp.34-51, 2007."},{"key":"29","unstructured":"[29] J.S. Coron, J. Patarin, and Y. Seurin, \u201cThe Random Oracle Model and the Ideal Cipher Model are Equivalent,\u201d LNCS, CRYPTO, vol.5157, pp.1-20, 2008."},{"key":"30","unstructured":"[30] J. Black, \u201cThe Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function,\u201d LNCS, FSE, vol.4047, pp.328-340, 2006."},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] A. Miyaji and M. Rashed, \u201cA new (n, 2n) Double Block Length Hash Function based on Single Key Scheduling,\u201d IEEE explore, AINA, pp.564-570, 2015.","DOI":"10.1109\/AINA.2015.237"},{"key":"32","unstructured":"[32] D. Joan and R. Vincent, The Design of Rijndael, AES-The Advanced Encryption Standard, Information security and cryptography, Springer, ISBN: 3-540-42580-2, 2002."},{"key":"33","unstructured":"[33] Report paper, \u201cStudy on cryptographic protocols,\u201d ENISA, https:\/\/www.enisa.europa.eu\/activities\/identity-and-trust\/library\/deliverables\/study-on-cryptographic-protocols, ISBN: 978-92-9204-103-8, 2014."},{"key":"34","unstructured":"[34] J. Katz, S. Lucks, and A. Thiruvengadam, \u201cHash Functions from Defective Ideal Ciphers,\u201d CT-RSA, vol.9048, pp.273-290, 2015."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/4\/E99.D_2015ICP0028\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T02:11:58Z","timestamp":1748830318000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E99.D\/4\/E99.D_2015ICP0028\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2015icp0028","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"type":"print","value":"0916-8532"},{"type":"electronic","value":"1745-1361"}],"subject":[],"published":{"date-parts":[[2016]]}}}