Provable security of cryptographic hash functions by