-
1
-
-
38149001822
-
Seven-property- preserving iterated hashing: ROX. Cryptology ePrint Archive
-
Report 2007/176
-
Andreeva, E., Neven, G., Preneel, B., Shrimpton, T.: Seven-property- preserving iterated hashing: ROX. Cryptology ePrint Archive, Report 2007/176 (2007)
-
(2007)
-
-
Andreeva, E.1
Neven, G.2
Preneel, B.3
Shrimpton, T.4
-
2
-
-
38149131990
-
Three-property preserving iterations of keyless compression functions
-
Workshop
-
Andreeva, E., Neven, G., Preneel, B., Shrimpton, T.: Three-property preserving iterations of keyless compression functions. In: ECRYPT Hash Workshop (2007)
-
(2007)
ECRYPT Hash
-
-
Andreeva, E.1
Neven, G.2
Preneel, B.3
Shrimpton, T.4
-
3
-
-
35048891868
-
Keying hash functions for message authentication
-
Koblitz, N, ed, CRYPTO 1996, Springer, Heidelberg
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1109
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
4
-
-
77649268663
-
Multi-property-preserving hash domain extension: The EMD transform
-
Lai, X, Chen, K, eds, ASIACRYPT 2006, Springer, Heidelberg
-
Bellare, M., Ristenpart, T.: Multi-property-preserving hash domain extension: The EMD transform. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 299-314. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4284
, pp. 299-314
-
-
Bellare, M.1
Ristenpart, T.2
-
5
-
-
38149004817
-
Hash functions in the dedicated-key setting: Design choices and MPP transforms
-
Arge, L, Cachin, C, Tarlecki, A, eds, ICALP 2007. 34th International Colloquium on Automata, Languages and Programming, Springer, Heidelberg
-
Bellare, M., Ristenpart, T.: Hash functions in the dedicated-key setting: Design choices and MPP transforms. In: Arge, L., Cachin, C., Tarlecki, A. (eds.) ICALP 2007. 34th International Colloquium on Automata, Languages and Programming. LNCS, vol. 4596, Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4596
-
-
Bellare, M.1
Ristenpart, T.2
-
6
-
-
0027726717
-
-
ACM CCS, ACM Press, New York 1993
-
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM CCS 1993, pp. 62-73. ACM Press, New York (1993)
-
(1993)
Random oracles are practical: A paradigm for designing efficient protocols
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
7
-
-
84958663551
-
Collision-resistant hashing: Towards making UOWHFs practical
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Collision-resistant hashing: Towards making UOWHFs practical. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
-
-
Bellare, M.1
Rogaway, P.2
-
9
-
-
33745119040
-
Merkle-Damgård revisited: How to construct a hash function
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Coron, J.-S., Dodis, Y., Malinaud, C., Puniya, P.: Merkle-Damgård revisited: How to construct a hash function. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 430-448. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 430-448
-
-
Coron, J.-S.1
Dodis, Y.2
Malinaud, C.3
Puniya, P.4
-
10
-
-
1842616017
-
Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
-
Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM Journal on Computing 33(1), 167-226 (2003)
-
(2003)
SIAM Journal on Computing
, vol.33
, Issue.1
, pp. 167-226
-
-
Cramer, R.1
Shoup, V.2
-
11
-
-
84981199109
-
A design principle for hash functions
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Damgård, I.: A design principle for hash functions. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 416-427. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 416-427
-
-
Damgård, I.1
-
13
-
-
33749549095
-
Strengthening digital signatures via randomized hashing
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Halevi, S., Krawczyk, H.: Strengthening digital signatures via randomized hashing. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 41-59. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 41-59
-
-
Halevi, S.1
Krawczyk, H.2
-
14
-
-
33746056045
-
-
Kelsey, J., Kohno, T.: Herding hash functions and the Nostradamus attack. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, 4004, pp. 183-200. Springer, Heidelberg (2006), from http://eprint.iacr.org/2005/281
-
Kelsey, J., Kohno, T.: Herding hash functions and the Nostradamus attack. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 183-200. Springer, Heidelberg (2006), from http://eprint.iacr.org/2005/281
-
-
-
-
15
-
-
24944541563
-
n work
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
n work. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 474-490. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 474-490
-
-
Kelsey, J.1
Schneier, B.2
-
16
-
-
84985820553
-
Hash functions based on block ciphers
-
Rueppel, R.A, ed, EUROCRYPT 1992, Springer, Heidelberg
-
Lai, X., Massey, J.L.: Hash functions based on block ciphers. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 55-70. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.658
, pp. 55-70
-
-
Lai, X.1
Massey, J.L.2
-
17
-
-
0345490606
-
New parallel domain extenders for UOWHF
-
Laih, C.-S, ed, ASIACRYPT 2003, Springer, Heidelberg
-
Lee, W., Chang, D., Lee, S., Sung, S.H., Nandi, M.: New parallel domain extenders for UOWHF. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 208-227. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2894
, pp. 208-227
-
-
Lee, W.1
Chang, D.2
Lee, S.3
Sung, S.H.4
Nandi, M.5
-
18
-
-
0024867460
-
A study of password security
-
Luby, M., Rackoff, C.: A study of password security. Journal of Cryptology 1(3), 151-158 (1989)
-
(1989)
Journal of Cryptology
, vol.1
, Issue.3
, pp. 151-158
-
-
Luby, M.1
Rackoff, C.2
-
19
-
-
33646776051
-
A failure-friendly design principle for hash functions
-
Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
-
Lucks, S.: A failure-friendly design principle for hash functions. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 474-494. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3788
, pp. 474-494
-
-
Lucks, S.1
-
20
-
-
84920380941
-
Protocols for public key cryptosystems
-
IEEE Computer Society Press, Los Alamitos
-
Merkle, R.C.: Protocols for public key cryptosystems. In: IEEE Symposium on Security and Privacy, pp. 122-134. IEEE Computer Society Press, Los Alamitos (1980)
-
(1980)
IEEE Symposium on Security and Privacy
, pp. 122-134
-
-
Merkle, R.C.1
-
21
-
-
84969346266
-
A certified digital signature
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
22
-
-
84937461306
-
One way hash functions and DES
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C.: One way hash functions and DES. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 428-446. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 428-446
-
-
Merkle, R.C.1
-
23
-
-
84945124866
-
Hash functions: From Merkle-Damgård to Shoup
-
Pfitzmann, B, ed, EUROCRYPT 2001, Springer, Heidelberg
-
Mironov, I.: Hash functions: From Merkle-Damgård to Shoup. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 166-181. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2045
, pp. 166-181
-
-
Mironov, I.1
-
24
-
-
33745835370
-
Collision-resistant no more: Hash-and-sign paradigm revisited
-
PKC, Springer, Heidelberg
-
Mironov, I.: Collision-resistant no more: Hash-and-sign paradigm revisited. In: PKC 2006. LNCS, pp. 140-156. Springer, Heidelberg (2006)
-
(2006)
LNCS
, pp. 140-156
-
-
Mironov, I.1
-
25
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
ACM Press, New York
-
Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: 21st ACM STOC, pp. 33-43. ACM Press, New York (1989)
-
(1989)
21st ACM STOC
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
26
-
-
84937420653
-
Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Nielsen, J.B.: Separating random oracle proofs from complexity theoretic proofs: The non-committing encryption case. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 111-126. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 111-126
-
-
Nielsen, J.B.1
-
27
-
-
84887264252
-
Formalizing human ignorance: Collision-resistant hashing without the keys
-
Nguyen, P.Q, ed, VIETCRYPT 2006, Springer, Heidelberg
-
Rogaway, P.: Formalizing human ignorance: Collision-resistant hashing without the keys. In: Nguyen, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4341
-
-
Rogaway, P.1
-
28
-
-
35048855067
-
-
Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 371-388. Springer, Heidelberg (2004)
-
Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371-388. Springer, Heidelberg (2004)
-
-
-
-
29
-
-
29144505048
-
Masking-based domain extenders for UOWHFs: Bounds and constructions
-
Sarkar, P.: Masking-based domain extenders for UOWHFs: bounds and constructions. IEEE Transactions on Information Theory 51(12), 4299-4311 (2005)
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.12
, pp. 4299-4311
-
-
Sarkar, P.1
-
30
-
-
84948968075
-
A composition theorem for universal one-way hash functions
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Shoup, V.: A composition theorem for universal one-way hash functions. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 445-452. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 445-452
-
-
Shoup, V.1
-
31
-
-
38149033239
-
Proofs of security for the Unix password hashing algorithm
-
Okamoto, T, ed, ASIACRYPT 2000, Springer, Heidelberg
-
Wagner, D., Goldberg, I.: Proofs of security for the Unix password hashing algorithm. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1976
-
-
Wagner, D.1
Goldberg, I.2
-
32
-
-
33745171465
-
-
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, 3621, pp. 17-36. Springer, Heidelberg (2005)
-
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-1. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
-
-
-
-
33
-
-
24944591357
-
How to break MD5 and other hash functions
-
Cramer, R.J.F, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
|