URL: https://ehash.isec.tugraz.at/uploads/c/ca/Cheetah.pdf
%PDF-1.4
%����
5 0 obj
<< /S /GoTo /D (section.1) >>
endobj
8 0 obj
(Specification)
endobj
9 0 obj
<< /S /GoTo /D (subsection.1.1) >>
endobj
12 0 obj
(Preliminaries)
endobj
13 0 obj
<< /S /GoTo /D (subsection.1.2) >>
endobj
16 0 obj
(Hash function)
endobj
17 0 obj
<< /S /GoTo /D (subsection.1.3) >>
endobj
20 0 obj
(Compression function)
endobj
21 0 obj
<< /S /GoTo /D (subsubsection.1.3.1) >>
endobj
24 0 obj
(Cheetah-224 and Cheetah-256)
endobj
25 0 obj
<< /S /GoTo /D (subsubsection.1.3.2) >>
endobj
28 0 obj
(Cheetah-384 and Cheetah-512)
endobj
29 0 obj
<< /S /GoTo /D (subsection.1.4) >>
endobj
32 0 obj
(Cheetah as PRF and MAC)
endobj
33 0 obj
<< /S /GoTo /D (subsection.1.5) >>
endobj
36 0 obj
(Other digest sizes)
endobj
37 0 obj
<< /S /GoTo /D (section.2) >>
endobj
40 0 obj
(Design rationale)
endobj
41 0 obj
<< /S /GoTo /D (subsection.2.1) >>
endobj
44 0 obj
(Hash function)
endobj
45 0 obj
<< /S /GoTo /D (subsection.2.2) >>
endobj
48 0 obj
(Compression function)
endobj
49 0 obj
<< /S /GoTo /D (subsubsection.2.2.1) >>
endobj
52 0 obj
(Round primitives)
endobj
53 0 obj
<< /S /GoTo /D (subsection.2.3) >>
endobj
56 0 obj
(Number of rounds as tunable parameter)
endobj
57 0 obj
<< /S /GoTo /D (section.3) >>
endobj
60 0 obj
(Resistance to attacks)
endobj
61 0 obj
<< /S /GoTo /D (subsection.3.1) >>
endobj
64 0 obj
(Generic attacks)
endobj
65 0 obj
<< /S /GoTo /D (subsubsection.3.1.1) >>
endobj
68 0 obj
(Herding attacks)
endobj
69 0 obj
<< /S /GoTo /D (subsubsection.3.1.2) >>
endobj
72 0 obj
(Fast second preimage attack)
endobj
73 0 obj
<< /S /GoTo /D (subsubsection.3.1.3) >>
endobj
76 0 obj
(Multicollisions)
endobj
77 0 obj
<< /S /GoTo /D (subsubsection.3.1.4) >>
endobj
80 0 obj
(Length-extension attacks)
endobj
81 0 obj
<< /S /GoTo /D (subsection.3.2) >>
endobj
84 0 obj
(Attacks on the compression function)
endobj
85 0 obj
<< /S /GoTo /D (subsubsection.3.2.1) >>
endobj
88 0 obj
(Collisions)
endobj
89 0 obj
<< /S /GoTo /D (subsubsection.3.2.2) >>
endobj
92 0 obj
(Preimages and second preimages)
endobj
93 0 obj
<< /S /GoTo /D (subsection.3.3) >>
endobj
96 0 obj
(HMAC-PRF security)
endobj
97 0 obj
<< /S /GoTo /D (subsection.3.4) >>
endobj
100 0 obj
(Randomized hashing attack)
endobj
101 0 obj
<< /S /GoTo /D (subsection.3.5) >>
endobj
104 0 obj
(Security level)
endobj
105 0 obj
<< /S /GoTo /D (section.4) >>
endobj
108 0 obj
(Advantages and limitations)
endobj
109 0 obj
<< /S /GoTo /D (section.5) >>
endobj
112 0 obj
(Software and hardware implementation)
endobj
113 0 obj
<< /S /GoTo /D (subsection.5.1) >>
endobj
116 0 obj
(Software)
endobj
117 0 obj
<< /S /GoTo /D (subsection.5.2) >>
endobj
120 0 obj
(Hardware)
endobj
121 0 obj
<< /S /GoTo /D [122 0 R /Fit ] >>
endobj
153 0 obj <<
/Length 1289
/Filter /FlateDecode
>>
stream
x���r�6��~
-ə�%�@w�]$��ڵ]0lq"��J�<}p@��8v�UycQy@|���o�G?�1"*�D���zD3�J�G���1:OFE㩍���