J
John P. Steinberger
Researcher at Tsinghua University
Publications - 62
Citations - 1966
John P. Steinberger is an academic researcher from Tsinghua University. The author has contributed to research in topics: Block cipher & Random permutation. The author has an hindex of 22, co-authored 62 publications receiving 1768 citations. Previous affiliations of John P. Steinberger include University of Waterloo & Université catholique de Louvain.
Papers
More filters
Book ChapterDOI
Tight Security Bounds for Key-Alternating Ciphers
Shan Chen,John P. Steinberger +1 more
TL;DR: Even and Mansour as mentioned in this paper proved indistinguishability security up to 2 n/2 queries, which is tight for general t = 1 and for higher values of t in a series of recent papers.
Book ChapterDOI
The preimage security of double-block-length compression functions
Frederik Armknecht,Ewan Fleischmann,Matthias Krause,Jooyoung Lee,Martijn Stam,John P. Steinberger +5 more
TL;DR: In this paper, the authors derived preimage security bounds for block cipher based double-block-length, double-call hash functions, such as Abreast-DM, Tandem-DM and Hirose's scheme.
Posted Content
The preimage security of double-block-length compression functions.
TL;DR: Improved bounds on the preimage security of the three "classical" double-block-length, double-call, block cipher-based compression functions, these being Abreast-DM, Tandem-DM and Hirose's scheme are given.
Book ChapterDOI
Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers
TL;DR: A family of compression functions built from fixed-key blockciphers are proposed and their collision and preimage security in the ideal-cipher model has security approaching and in many cases equaling the security upper bounds found in previous work of the authors.
Book ChapterDOI
Security/efficiency tradeoffs for permutation-based hashing
TL;DR: These results provide guidance when trying to design or analyze a permutation-based hash function about the limits of what can possibly be done, and show that any 2n-bit to n- bit compression function will have unacceptable collision resistance it makes fewer than three n-bit permutation invocations.