메뉴 건너뛰기




Volumn 4341 LNCS, Issue , 2006, Pages 211-228

Formalizing human ignorance collision-resistant hashing without the keys

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84887264252     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11958239_14     Document Type: Conference Paper
Times cited : (65)

References (32)
  • 1
    • 84887300122 scopus 로고    scopus 로고
    • XOR MACs: New methods for message authentication using finite pseudorandom functions
    • the author's web page
    • M. Bellare, R. Guérin, and P. Rogaway. XOR MACs: New methods for message authentication using finite pseudorandom functions. Full version of CRYPTO '95 paper. Available on-line from the author's web page.
    • Full Version of CRYPTO '95 Paper
    • Bellare, M.1    Guérin, R.2    Rogaway, P.3
  • 2
    • 85032128552 scopus 로고    scopus 로고
    • The security of the cipher block chaining message authentication code
    • M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. J. of Computer and System Sciences (JCSS), Vol. 61, no. 3, pp. 362-399, 2000.
    • (2000) J. of Computer and System Sciences (JCSS) , vol.61 , Issue.3 , pp. 362-399
    • Bellare, M.1    Kilian, J.2    Rogaway, P.3
  • 3
    • 0005343811 scopus 로고    scopus 로고
    • Collision-resistant hashing: Towards making UOWHFs practical
    • LNCS, Springer
    • M. Bellare and P. Rogaway. Collision-resistant hashing: towards making UOWHFs practical. Advances in Cryptology - CRYPTO '97, LNCS, Springer, 1997.
    • (1997) Advances in Cryptology - CRYPTO '97
    • Bellare, M.1    Rogaway, P.2
  • 5
    • 14844342644 scopus 로고    scopus 로고
    • Generic groups, collision resistance, and ECDSA
    • D. Brown. Generic groups, collision resistance, and ECDSA. Designs, Codes and Cryptography, Vol. 35, no. 1, pp. 119-152, 2005.
    • (2005) Designs, Codes and Cryptography , vol.35 , Issue.1 , pp. 119-152
    • Brown, D.1
  • 7
    • 85028868533 scopus 로고
    • Collision free hash functions and public key signature schemes
    • LNCS Springer
    • I. Damgard. Collision free hash functions and public key signature schemes. Advance in Cryptology - EUROCRYPT '87, LNCS Vol. 304, Springer, pp. 203-216, 1987.
    • (1987) Advance in Cryptology - EUROCRYPT '87 , vol.304 , pp. 203-216
    • Damgard, I.1
  • 8
    • 84981199109 scopus 로고
    • A design principle for hash functions
    • LNCS Springer
    • I. Damgard. A design principle for hash functions. Advances in Cryptology - CRYPTO '89, LNCS Vol. 435, Springer, 1990.
    • (1990) Advances in Cryptology - CRYPTO '89 , vol.435
    • Damgard, I.1
  • 9
    • 84989495390 scopus 로고
    • On the design of provably secure cryptographic hash functions
    • LNCS Springer
    • A. De Santis and M. Yung. On the design of provably secure cryptographic hash functions. Advance in Cryptology - EUROCRYPT '90, LNCS Vol. 473, Springer, pp. 412-431, 1991.
    • (1991) Advance in Cryptology - EUROCRYPT '90 , vol.473 , pp. 412-431
    • De Santis, A.1    Yung, M.2
  • 11
    • 0029767165 scopus 로고    scopus 로고
    • On the composition of zero-knowledge proof systems
    • Feb
    • O. Goldreich and H. Krawczyk. On the composition of zero-knowledge proof systems. SIAM Journal on Computing, Vol. 25, no. 1, pp. 169-192, Feb 1997.
    • (1997) SIAM Journal on Computing , vol.25 , Issue.1 , pp. 169-192
    • Goldreich, O.1    Krawczyk, H.2
  • 12
    • 0028676264 scopus 로고
    • Definitions and properties of zero-knowledge proof systems
    • O. Goldreich and Y. Oren. Definitions and properties of zero-knowledge proof systems. J. of Cryptology, Vol. 7, no. 1, pp. 1-32, 1994.
    • (1994) J. of Cryptology , vol.7 , Issue.1 , pp. 1-32
    • Goldreich, O.1    Oren, Y.2
  • 13
    • 0021409284 scopus 로고
    • Probabilistic encryption
    • S. Goldwasser and S. Micali. Probabilistic encryption. J. Comput. Syst. Sci., Vol. 28, no. 2, pp. 270-299, 1984.
    • (1984) J. Comput. Syst. Sci. , vol.28 , Issue.2 , pp. 270-299
    • Goldwasser, S.1    Micali, S.2
  • 14
    • 84887302044 scopus 로고    scopus 로고
    • Earlier version
    • Earlier version in STOC 82.
    • STOC 82
  • 15
    • 0024611659 scopus 로고
    • The knowledge complexity of interactive proof systems
    • S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on Computing, Vol. 18, no. 1, pp. 186-208, 1989.
    • (1989) SIAM Journal on Computing , vol.18 , Issue.1 , pp. 186-208
    • Goldwasser, S.1    Micali, S.2    Rackoff, C.3
  • 16
    • 0023985465 scopus 로고
    • A digital signature scheme secure against adaptive chosen-message attacks
    • S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. on Comp., Vol. 17, pp. 281-308, 1988.
    • (1988) SIAM J. on Comp. , vol.17 , pp. 281-308
    • Goldwasser, S.1    Micali, S.2    Rivest, R.3
  • 20
    • 84937461306 scopus 로고
    • One way hash functions and DES
    • LNCS Springer
    • R. Merkle. One way hash functions and DES. Advances in Cryptology - CRYPTO 89, LNCS Vol. 435, Springer, pp. 428-446, 1990.
    • (1990) Advances in Cryptology - CRYPTO 89 , vol.435 , pp. 428-446
    • Merkle, R.1
  • 22
    • 0022029028 scopus 로고
    • Generating strong one-way functions with cryptographic algorithm
    • S. Matyas, C. Meyer, and J. Oseas. Generating strong one-way functions with cryptographic algorithm. IBM Tech. Disclosure Bulletin, 27, pp. 5658-5659, 1985.
    • (1985) IBM Tech. Disclosure Bulletin , vol.27 , pp. 5658-5659
    • Matyas, S.1    Meyer, C.2    Oseas, J.3
  • 23
    • 34547233363 scopus 로고    scopus 로고
    • National Institute of Standards and Technology Aug 1
    • National Institute of Standards and Technology. FIPS PUB 180-2, Secure Hash Standard, Aug 1, 2002.
    • (2002) FIPS PUB 180-2, Secure Hash Standard
  • 24
    • 0023601199 scopus 로고
    • On the cunning power of cheating verifiers: Some observations about zero-knowledge proofs
    • IEEE Press
    • Y. Oren. On the cunning power of cheating verifiers: some observations about zero-knowledge proofs. 28th Annual Symposium on the Foundations of Computer Science (FOCS 87), IEEE Press, pp. 462-471, 1987.
    • (1987) 28th Annual Symposium on the Foundations of Computer Science (FOCS 87) , pp. 462-471
    • Oren, Y.1
  • 25
    • 0347802687 scopus 로고
    • Digital signatures
    • R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors, Academic Press
    • M. Rabin. Digital signatures. In Foundations of secure computation, R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors, Academic Press, pp. 155-168, 1978.
    • (1978) Foundations of Secure Computation , pp. 155-168
    • Rabin, M.1
  • 27
    • 78650922644 scopus 로고
    • The MD4 message digest algorithm
    • LNCS Springer
    • R. Rivest. The MD4 message digest algorithm. Advance in Cryptology - CRYPTO '90, LNCS Vol. 537, Springer, pp. 303-311, 1991.
    • (1991) Advance in Cryptology - CRYPTO '90 , vol.537 , pp. 303-311
    • Rivest, R.1
  • 28
    • 35048855067 scopus 로고    scopus 로고
    • Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
    • LNCS Springer
    • P. Rogaway and T. Shrimpton. Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. Fast Software Encryption (FSE 2004), LNCS Vol. 3017, Springer, pp. 371-388, 2004.
    • (2004) Fast Software Encryption (FSE 2004) , vol.3017 , pp. 371-388
    • Rogaway, P.1    Shrimpton, T.2
  • 29
    • 0029272402 scopus 로고
    • Necessary and sufficient conditions for collision-free hashing
    • A. Russell. Necessary and sufficient conditions for collision-free hashing. J. of Cryp-tology, Vol. 8, no. 2, pp. 87-99, 1995.
    • (1995) J. of Cryp-tology , vol.8 , Issue.2 , pp. 87-99
    • Russell, A.1
  • 31
    • 33745171465 scopus 로고    scopus 로고
    • Finding collisions in the full SHA-1
    • LNCS Springer
    • X. Wang, Y. Yin, and H. Yu. Finding Collisions in the Full SHA-1. Advances in Cryptology - CRYPTO '05, LNCS Vol. 3621, Springer, pp. 17-36, 2005.
    • (2005) Advances in Cryptology - CRYPTO '05 , vol.3621 , pp. 17-36
    • Wang, X.1    Yin, Y.2    Yu, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.