scispace - formally typeset
J

John P. Steinberger

Researcher at Tsinghua University

Publications -  62
Citations -  1966

John P. Steinberger is an academic researcher from Tsinghua University. The author has contributed to research in topics: Block cipher & Random permutation. The author has an hindex of 22, co-authored 62 publications receiving 1768 citations. Previous affiliations of John P. Steinberger include University of Waterloo & Université catholique de Louvain.

Papers
More filters
Book ChapterDOI

Tight Security Bounds for Key-Alternating Ciphers

TL;DR: Even and Mansour as mentioned in this paper proved indistinguishability security up to 2 n/2 queries, which is tight for general t = 1 and for higher values of t in a series of recent papers.
Book ChapterDOI

The preimage security of double-block-length compression functions

TL;DR: In this paper, the authors derived preimage security bounds for block cipher based double-block-length, double-call hash functions, such as Abreast-DM, Tandem-DM and Hirose's scheme.
Posted Content

The preimage security of double-block-length compression functions.

TL;DR: Improved bounds on the preimage security of the three "classical" double-block-length, double-call, block cipher-based compression functions, these being Abreast-DM, Tandem-DM and Hirose's scheme are given.
Book ChapterDOI

Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers

TL;DR: A family of compression functions built from fixed-key blockciphers are proposed and their collision and preimage security in the ideal-cipher model has security approaching and in many cases equaling the security upper bounds found in previous work of the authors.
Book ChapterDOI

Security/efficiency tradeoffs for permutation-based hashing

TL;DR: These results provide guidance when trying to design or analyze a permutation-based hash function about the limits of what can possibly be done, and show that any 2n-bit to n- bit compression function will have unacceptable collision resistance it makes fewer than three n-bit permutation invocations.