-
1
-
-
0019669180
-
An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems
-
C. A. Asmuth and G. R. Blakley. An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems. Computers and Mathematics with Applications, pages 447-450, 1981.
-
(1981)
Computers and Mathematics with Applications
, pp. 447-450
-
-
Asmuth, C.A.1
Blakley, G.R.2
-
2
-
-
38049102616
-
On the impossibility of efficiently combining collision resistant hash functions
-
Dan Boneh and Xavier Boyen. On the impossibility of efficiently combining collision resistant hash functions. In CRYPTO, 2006.
-
(2006)
CRYPTO
-
-
Boneh, D.1
Boyen, X.2
-
3
-
-
33746095782
-
Vsh, an efficient and provable collision-resistant hash function
-
Scott Contini, Arjen K. Lenstra, and Ron Steinfeld. Vsh, an efficient and provable collision-resistant hash function. In EUROCRYPT, pages 165-182, 2006.
-
(2006)
EUROCRYPT
, pp. 165-182
-
-
Contini, S.1
Lenstra, A.K.2
Steinfeld, R.3
-
4
-
-
33745119040
-
Merkle-damgård revisited : How to construct a hash function
-
Advances in Cryptology, CRYPTO '05, of
-
Jean-Sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, and Prashant Puniya. Merkle-damgård revisited : How to construct a hash function. In Advances in Cryptology - CRYPTO '05, volume 3621 of Lecture Notes in Computer Science, pages 430-448, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3621
, pp. 430-448
-
-
Coron, J.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
5
-
-
24144468589
-
Chosen-ciphertext security of multiple encryption
-
Yevgeniy Dodis and Jonathan Katz. Chosen-ciphertext security of multiple encryption. In TCC, pages 188-209, 2005.
-
(2005)
TCC
, pp. 188-209
-
-
Dodis, Y.1
Katz, J.2
-
6
-
-
0022069123
-
On the power of cascade ciphers
-
Shimon Even and Oded Goldreich. On the power of cascade ciphers. ACM Trans. Comput. Syst., 3(2):108-116, 1985.
-
(1985)
ACM Trans. Comput. Syst
, vol.3
, Issue.2
, pp. 108-116
-
-
Even, S.1
Goldreich, O.2
-
7
-
-
24944472289
-
On robust combiners for oblivious transfer and other primitives
-
Danny Harnik, Joe Kilian, Moni Naor, Orner Reingold, and Alon Rosen. On robust combiners for oblivious transfer and other primitives. In EUROCRYPT, pages 96-113, 2005.
-
(2005)
EUROCRYPT
, pp. 96-113
-
-
Harnik, D.1
Kilian, J.2
Naor, M.3
Reingold, O.4
Rosen, A.5
-
8
-
-
24144475180
-
On tolerant cryptographic constructions
-
Amir Herzberg. On tolerant cryptographic constructions. In CT-RSA, pages 172-190, 2005.
-
(2005)
CT-RSA
, pp. 172-190
-
-
Herzberg, A.1
-
9
-
-
33645780237
-
Multicollisions in iterated hash functions. application to cascaded constructions
-
Antoine Joux. Multicollisions in iterated hash functions. application to cascaded constructions. In CRYPTO, pages 306-316, 2004.
-
(2004)
CRYPTO
, pp. 306-316
-
-
Joux, A.1
-
10
-
-
38049136297
-
-
Jonathan Katz and Chiu-Yuen Koo. On constructing universal one-way hash functions from arbitrary one-way functions, 2005. Cryptology ePrint Archive: Report 2005/328.
-
Jonathan Katz and Chiu-Yuen Koo. On constructing universal one-way hash functions from arbitrary one-way functions, 2005. Cryptology ePrint Archive: Report 2005/328.
-
-
-
-
11
-
-
0027308007
-
Cascade ciphers: The importance of being first
-
Ueli M. Maurer and James L. Massey. Cascade ciphers: The importance of being first. J. Cryptology, 6(1):55-61, 1993.
-
(1993)
J. Cryptology
, vol.6
, Issue.1
, pp. 55-61
-
-
Maurer, U.M.1
Massey, J.L.2
-
12
-
-
33749557902
-
On robust combiners for private information retrieval and other primitives
-
Cynthia Dwork, editor, CRYPTO '06, of
-
Remo Meier and Bartosz Przydatek. On robust combiners for private information retrieval and other primitives. In Cynthia Dwork, editor, CRYPTO '06, volume 4117 of Lecture Notes in Computer Science, pages 555-569, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4117
, pp. 555-569
-
-
Meier, R.1
Przydatek, B.2
-
13
-
-
38049022468
-
Robuster combiners for oblivious transfer
-
TCC 2007, of
-
Remo Meier, Bartosz Przydatek, and Jürg Wullschleger. Robuster combiners for oblivious transfer. In TCC 2007, volume 4392 of Lecture Notes in Computer Science, pages 404-418, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4392
, pp. 404-418
-
-
Meier, R.1
Przydatek, B.2
Wullschleger, J.3
-
14
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
Moni Naor and Moti Yung. Universal one-way hash functions and their cryptographic applications. In STOC, pages 33-43, 1989.
-
(1989)
STOC
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
15
-
-
38049155317
-
-
Phillip Rogaway. Formalizing human ignorance: Collision-resistant hashing without the keys, 2006. Cryptology ePrint Archive: Report 2006/281.
-
Phillip Rogaway. Formalizing human ignorance: Collision-resistant hashing without the keys, 2006. Cryptology ePrint Archive: Report 2006/281.
-
-
-
-
16
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
John Rompel. One-way functions are necessary and sufficient for secure signatures. In STOC, pages 387-394, 1990.
-
(1990)
STOC
, pp. 387-394
-
-
Rompel, J.1
-
17
-
-
84957690790
-
Finding collisions on a one-way street: Can secure hash functions be based on general assumptions?
-
Daniel R. Simon. Finding collisions on a one-way street: Can secure hash functions be based on general assumptions? In EUROCRYPT, pages 334-345, 1998.
-
(1998)
EUROCRYPT
, pp. 334-345
-
-
Simon, D.R.1
-
18
-
-
33745171465
-
Finding collisions in the full sha-1
-
Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu. Finding collisions in the full sha-1. In CRYPTO, pages 17-36, 2005.
-
(2005)
CRYPTO
, pp. 17-36
-
-
Wang, X.1
Lisa Yin, Y.2
Yu, H.3
-
19
-
-
24944591357
-
How to break md5 and other hash functions
-
Xiaoyun Wang and Hongbo Yu. How to break md5 and other hash functions. In EUROCRYPT, pages 19-35, 2005.
-
(2005)
EUROCRYPT
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
|