-
1
-
-
84958663551
-
Collision-resistant hashing: Towards making UOWHFs practical
-
Kaliski Jr, B.S, ed, CRYPTO 1997, Springer, Heidelberg
-
Bellare, M., Rogaway, P.: Collision-resistant hashing: Towards making UOWHFs practical. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 470-484. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 470-484
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
33646825997
-
Hash based digital signature schemes
-
Smart, N, ed, Cryptography and Coding 2005, Springer, Heidelberg
-
Dods, C., Smart, N., Stam, M.: Hash based digital signature schemes. In: Smart, N. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 96-115. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3796
, pp. 96-115
-
-
Dods, C.1
Smart, N.2
Stam, M.3
-
3
-
-
38049067956
-
On the security and the efficiency of the merkle signature scheme. Cryptology ePrint Archive
-
Report 2005/192
-
Garcia, L.C.C: On the security and the efficiency of the merkle signature scheme. Cryptology ePrint Archive, Report 2005/192 (2005), http://eprint.iacr. org/
-
(2005)
-
-
Garcia, L.C.C.1
-
4
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal on Computing 17(2), 281-308 (1988)
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.L.3
-
5
-
-
33749549095
-
Strengthening digital signatures via randomized hashing
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Halevi, S., Krawczyk, H.: Strengthening digital signatures via randomized hashing. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 41-59. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 41-59
-
-
Halevi, S.1
Krawczyk, H.2
-
6
-
-
0003605145
-
Constructing digital signatures from a one way function
-
Technical Report SRI-CSL-98, SRI International Computer Science Laboratory
-
Lamport, L.: Constructing digital signatures from a one way function. Technical Report SRI-CSL-98, SRI International Computer Science Laboratory (1979)
-
(1979)
-
-
Lamport, L.1
-
7
-
-
84969346266
-
A certified digital signature
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 218-238. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 218-238
-
-
Merkle, R.C.1
-
8
-
-
52949120899
-
One-time signatures revisited: Have they become practical. Cryptology ePrint Archive
-
Report 2005/442
-
Naor, D., Shenhav, A., Wool, A.: One-time signatures revisited: Have they become practical. Cryptology ePrint Archive, Report 2005/442 (2005), http://eprint.iacr.org/
-
(2005)
-
-
Naor, D.1
Shenhav, A.2
Wool, A.3
-
9
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
ACM Press, New York
-
Naor, M., Yung, M.: Universal one-way hash functions and their cryptographic applications. In: 21st Annual ACM Symposium on Theory of Computing - STOC 1989, pp. 33-43. ACM Press, New York (1989)
-
(1989)
21st Annual ACM Symposium on Theory of Computing
, vol.STOC 1989
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
10
-
-
35048855067
-
-
Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, 3017, pp. 371-388. Springer, Heidelberg (2004)
-
Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371-388. Springer, Heidelberg (2004)
-
-
-
-
11
-
-
0033280006
-
A compact and fast hybrid signature scheme for multicast packet authentication
-
ACM Press, New York
-
Rohatgi, P.: A compact and fast hybrid signature scheme for multicast packet authentication. In: ACM Conference on Computer and Communications Security - CSS 1999, pp. 93-100. ACM Press, New York (1999)
-
(1999)
ACM Conference on Computer and Communications Security
, vol.CSS 1999
, pp. 93-100
-
-
Rohatgi, P.1
-
12
-
-
84948968075
-
A composition theorem for universal one-way hash functions
-
Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
-
Shoup, V.: A composition theorem for universal one-way hash functions. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 445-452. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1807
, pp. 445-452
-
-
Shoup, V.1
-
13
-
-
35048813651
-
Merkle tree traversal in log space and time
-
Cachin, C, Camenisch, J.L, eds, EUROCRYPT 2004, Springer, Heidelberg
-
Szydlo, M.: Merkle tree traversal in log space and time. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 541-554. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 541-554
-
-
Szydlo, M.1
-
14
-
-
33745171465
-
Finding collisions in the full SHA-I
-
Shoup, V, ed, CRYPTO 2005, Springer, Heidelberg
-
Wang, X., Yin, Y.L., Yu, H.: Finding collisions in the full SHA-I. In: Shoup, V. (ed.) CRYPTO 2005. LNCS, vol. 3621, pp. 17-36. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
15
-
-
24944591357
-
How to break MD5 and other hash functions
-
Cramer, R, ed, EUROCRYPT 2005, Springer, Heidelberg
-
Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19-35. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3494
, pp. 19-35
-
-
Wang, X.1
Yu, H.2
|