Principles for designing secure block ciphers and one-way hash functions 安全なブロック暗号及び一方向性ハッシュ関数の設計に関する研究

Search this Article

Author

    • 鄭, 玉良 チョン, ユイリアン

Bibliographic Information

Title

Principles for designing secure block ciphers and one-way hash functions

Other Title

安全なブロック暗号及び一方向性ハッシュ関数の設計に関する研究

Author

鄭, 玉良

Author(Another name)

チョン, ユイリアン

University

横浜国立大学

Types of degree

工学博士

Grant ID

甲第60号

Degree year

1991-03-27

Note and Description

博士論文

Table of Contents

  1. Contents / p4 (0005.jp2)
  2. Cover / p1 (0002.jp2)
  3. Non-digital Signatures / p2 (0003.jp2)
  4. Acknowledgements / p3 (0004.jp2)
  5. Contents / p4 (0005.jp2)
  6. List of Figures / p7 (0008.jp2)
  7. List of Tables / p8 (0009.jp2)
  8. Abstract / p9 (0010.jp2)
  9. I Designing Secure Block Ciphers / p1 (0012.jp2)
  10. 1 Preliminaries / p2 (0013.jp2)
  11. 1.1 Pseudo-random String/Function Generators / p4 (0015.jp2)
  12. 1.2 Feistel-Type Transformation (FTT) / p8 (0019.jp2)
  13. 2 An Impossibility Result / p10 (0021.jp2)
  14. 2.1 [数式]Is Not Robust / p11 (0022.jp2)
  15. 2.2 Extensions / p15 (0026.jp2)
  16. 2.3 Remarks / p16 (0027.jp2)
  17. 3 Cryptographically Useful Transformations / p18 (0029.jp2)
  18. 3.1 Various Transformations / p18 (0029.jp2)
  19. 3.2 Theorems on the Transformations / p21 (0032.jp2)
  20. 3.3 Proof for Theorem 5 / p23 (0034.jp2)
  21. 3.4 Minimum Rounds for Robustness / p26 (0037.jp2)
  22. 3.5 Optimal Transformations / p30 (0041.jp2)
  23. 3.6 Notion of Super-Robustness / p31 (0042.jp2)
  24. 4 Block Ciphers Based on Type-2 Transformations / p34 (0045.jp2)
  25. 4.1 A Few Observations / p34 (0045.jp2)
  26. 4.2 PSBC ― A Provably Secure Block Cipher / p35 (0046.jp2)
  27. 4.3 A Variant of PSBC / p36 (0047.jp2)
  28. 4.4 Practical Block Ciphers / p40 (0051.jp2)
  29. II Constructing One-Way Hash Functions / p43 (0054.jp2)
  30. 5 Definitions / p44 (0055.jp2)
  31. 5.1 One-Way Functions / p44 (0055.jp2)
  32. 5.2 Universal Hash Functions / p47 (0058.jp2)
  33. 5.3 One-Way Hash Functions / p48 (0059.jp2)
  34. 6 Duality between Two Cryptographic Primitives / p53 (0064.jp2)
  35. 6.1 Extension and Compression Methods / p53 (0064.jp2)
  36. 6.2 PSGs and UOHs from One-Way Permutations / p56 (0067.jp2)
  37. 6.3 Practical One-Way Hash Functions / p61 (0072.jp2)
  38. 7 Structural Properties of One-Way Hash Functions / p66 (0077.jp2)
  39. 7.1 Transforming U0H/U into VOH/EN[ℓ] / p66 (0077.jp2)
  40. 7.2 UOHs from One-way Quasi-Injections / p69 (0080.jp2)
  41. 7.3 A Hierarchy of One-Way Hash Functions / p72 (0083.jp2)
  42. 8 Conclusion / p78 (0089.jp2)
  43. Bibliography / p80 (0091.jp2)
  44. Vita / p84 (0095.jp2)
1access

Codes

  • NII Article ID (NAID)
    500000076185
  • NII Author ID (NRID)
    • 8000000076388
  • DOI(NDL)
  • NDLBibID
    • 000000240499
  • Source
    • NDL ONLINE
    • NDL Digital Collections
Page Top