-
1
-
-
84887300122
-
XOR MACs: New methods for message authentication using finite pseudorandom functions
-
the author's web page
-
M. Bellare, R. Guérin, and P. Rogaway. XOR MACs: New methods for message authentication using finite pseudorandom functions. Full version of CRYPTO '95 paper. Available on-line from the author's web page.
-
Full Version of CRYPTO '95 Paper
-
-
Bellare, M.1
Guérin, R.2
Rogaway, P.3
-
2
-
-
85032128552
-
The security of the cipher block chaining message authentication code
-
M. Bellare, J. Kilian, and P. Rogaway. The security of the cipher block chaining message authentication code. J. of Computer and System Sciences (JCSS), Vol. 61, no. 3, pp. 362-399, 2000.
-
(2000)
J. of Computer and System Sciences (JCSS)
, vol.61
, Issue.3
, pp. 362-399
-
-
Bellare, M.1
Kilian, J.2
Rogaway, P.3
-
3
-
-
0005343811
-
Collision-resistant hashing: Towards making UOWHFs practical
-
LNCS, Springer
-
M. Bellare and P. Rogaway. Collision-resistant hashing: towards making UOWHFs practical. Advances in Cryptology - CRYPTO '97, LNCS, Springer, 1997.
-
(1997)
Advances in Cryptology - CRYPTO '97
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
14844342644
-
Generic groups, collision resistance, and ECDSA
-
D. Brown. Generic groups, collision resistance, and ECDSA. Designs, Codes and Cryptography, Vol. 35, no. 1, pp. 119-152, 2005.
-
(2005)
Designs, Codes and Cryptography
, vol.35
, Issue.1
, pp. 119-152
-
-
Brown, D.1
-
7
-
-
85028868533
-
Collision free hash functions and public key signature schemes
-
LNCS Springer
-
I. Damgard. Collision free hash functions and public key signature schemes. Advance in Cryptology - EUROCRYPT '87, LNCS Vol. 304, Springer, pp. 203-216, 1987.
-
(1987)
Advance in Cryptology - EUROCRYPT '87
, vol.304
, pp. 203-216
-
-
Damgard, I.1
-
8
-
-
84981199109
-
A design principle for hash functions
-
LNCS Springer
-
I. Damgard. A design principle for hash functions. Advances in Cryptology - CRYPTO '89, LNCS Vol. 435, Springer, 1990.
-
(1990)
Advances in Cryptology - CRYPTO '89
, vol.435
-
-
Damgard, I.1
-
9
-
-
84989495390
-
On the design of provably secure cryptographic hash functions
-
LNCS Springer
-
A. De Santis and M. Yung. On the design of provably secure cryptographic hash functions. Advance in Cryptology - EUROCRYPT '90, LNCS Vol. 473, Springer, pp. 412-431, 1991.
-
(1991)
Advance in Cryptology - EUROCRYPT '90
, vol.473
, pp. 412-431
-
-
De Santis, A.1
Yung, M.2
-
10
-
-
27844601582
-
Flexible authentication of XML documents
-
P. Devanbu, M. Gertz, A. Kwong, C. Martel, G. Nuckolls, and S. Stubblebine. Flexible authentication of XML documents. J. of Computer Security, Vol. 12, no. 6, pp. 841-864, 2004.
-
(2004)
J. of Computer Security
, vol.12
, Issue.6
, pp. 841-864
-
-
Devanbu, P.1
Gertz, M.2
Kwong, A.3
Martel, C.4
Nuckolls, G.5
Stubblebine, S.6
-
11
-
-
0029767165
-
On the composition of zero-knowledge proof systems
-
Feb
-
O. Goldreich and H. Krawczyk. On the composition of zero-knowledge proof systems. SIAM Journal on Computing, Vol. 25, no. 1, pp. 169-192, Feb 1997.
-
(1997)
SIAM Journal on Computing
, vol.25
, Issue.1
, pp. 169-192
-
-
Goldreich, O.1
Krawczyk, H.2
-
12
-
-
0028676264
-
Definitions and properties of zero-knowledge proof systems
-
O. Goldreich and Y. Oren. Definitions and properties of zero-knowledge proof systems. J. of Cryptology, Vol. 7, no. 1, pp. 1-32, 1994.
-
(1994)
J. of Cryptology
, vol.7
, Issue.1
, pp. 1-32
-
-
Goldreich, O.1
Oren, Y.2
-
13
-
-
0021409284
-
Probabilistic encryption
-
S. Goldwasser and S. Micali. Probabilistic encryption. J. Comput. Syst. Sci., Vol. 28, no. 2, pp. 270-299, 1984.
-
(1984)
J. Comput. Syst. Sci.
, vol.28
, Issue.2
, pp. 270-299
-
-
Goldwasser, S.1
Micali, S.2
-
14
-
-
84887302044
-
-
Earlier version
-
Earlier version in STOC 82.
-
STOC 82
-
-
-
15
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Micali, and C. Rackoff. The knowledge complexity of interactive proof systems. SIAM Journal on Computing, Vol. 18, no. 1, pp. 186-208, 1989.
-
(1989)
SIAM Journal on Computing
, vol.18
, Issue.1
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
16
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. on Comp., Vol. 17, pp. 281-308, 1988.
-
(1988)
SIAM J. on Comp.
, vol.17
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
20
-
-
84937461306
-
One way hash functions and DES
-
LNCS Springer
-
R. Merkle. One way hash functions and DES. Advances in Cryptology - CRYPTO 89, LNCS Vol. 435, Springer, pp. 428-446, 1990.
-
(1990)
Advances in Cryptology - CRYPTO 89
, vol.435
, pp. 428-446
-
-
Merkle, R.1
-
22
-
-
0022029028
-
Generating strong one-way functions with cryptographic algorithm
-
S. Matyas, C. Meyer, and J. Oseas. Generating strong one-way functions with cryptographic algorithm. IBM Tech. Disclosure Bulletin, 27, pp. 5658-5659, 1985.
-
(1985)
IBM Tech. Disclosure Bulletin
, vol.27
, pp. 5658-5659
-
-
Matyas, S.1
Meyer, C.2
Oseas, J.3
-
23
-
-
34547233363
-
-
National Institute of Standards and Technology Aug 1
-
National Institute of Standards and Technology. FIPS PUB 180-2, Secure Hash Standard, Aug 1, 2002.
-
(2002)
FIPS PUB 180-2, Secure Hash Standard
-
-
-
24
-
-
0023601199
-
On the cunning power of cheating verifiers: Some observations about zero-knowledge proofs
-
IEEE Press
-
Y. Oren. On the cunning power of cheating verifiers: some observations about zero-knowledge proofs. 28th Annual Symposium on the Foundations of Computer Science (FOCS 87), IEEE Press, pp. 462-471, 1987.
-
(1987)
28th Annual Symposium on the Foundations of Computer Science (FOCS 87)
, pp. 462-471
-
-
Oren, Y.1
-
25
-
-
0347802687
-
Digital signatures
-
R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors, Academic Press
-
M. Rabin. Digital signatures. In Foundations of secure computation, R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, editors, Academic Press, pp. 155-168, 1978.
-
(1978)
Foundations of Secure Computation
, pp. 155-168
-
-
Rabin, M.1
-
26
-
-
84947798969
-
Notions of reducibility between cryptographic primitives
-
LNCS Springer
-
O. Reingold, L. Trevisan, and S. Vadhan. Notions of reducibility between cryptographic primitives. Theory of Cryptography Conference, TCC 2004, LNCS Vol. 2951, Springer, pp. 1-20, 2004.
-
(2004)
Theory of Cryptography Conference, TCC 2004
, vol.2951
, pp. 1-20
-
-
Reingold, O.1
Trevisan, L.2
Vadhan, S.3
-
27
-
-
78650922644
-
The MD4 message digest algorithm
-
LNCS Springer
-
R. Rivest. The MD4 message digest algorithm. Advance in Cryptology - CRYPTO '90, LNCS Vol. 537, Springer, pp. 303-311, 1991.
-
(1991)
Advance in Cryptology - CRYPTO '90
, vol.537
, pp. 303-311
-
-
Rivest, R.1
-
28
-
-
35048855067
-
Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance
-
LNCS Springer
-
P. Rogaway and T. Shrimpton. Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. Fast Software Encryption (FSE 2004), LNCS Vol. 3017, Springer, pp. 371-388, 2004.
-
(2004)
Fast Software Encryption (FSE 2004)
, vol.3017
, pp. 371-388
-
-
Rogaway, P.1
Shrimpton, T.2
-
29
-
-
0029272402
-
Necessary and sufficient conditions for collision-free hashing
-
A. Russell. Necessary and sufficient conditions for collision-free hashing. J. of Cryp-tology, Vol. 8, no. 2, pp. 87-99, 1995.
-
(1995)
J. of Cryp-tology
, vol.8
, Issue.2
, pp. 87-99
-
-
Russell, A.1
-
30
-
-
24944575304
-
Cryptanalysis of the hash functions MD4 and RIPEMD
-
LNCS Springer
-
X. Wang, X. Lai, D. Feng, H. Chen, and X. Yu. Cryptanalysis of the hash functions MD4 and RIPEMD. Advances in Cryptology - EUROCRYPT '05, LNCS Vol. 3494, Springer, pp. 1-18, 2005.
-
(2005)
Advances in Cryptology - EUROCRYPT '05
, vol.3494
, pp. 1-18
-
-
Wang, X.1
Lai, X.2
Feng, D.3
Chen, H.4
Yu, X.5
-
31
-
-
33745171465
-
Finding collisions in the full SHA-1
-
LNCS Springer
-
X. Wang, Y. Yin, and H. Yu. Finding Collisions in the Full SHA-1. Advances in Cryptology - CRYPTO '05, LNCS Vol. 3621, Springer, pp. 17-36, 2005.
-
(2005)
Advances in Cryptology - CRYPTO '05
, vol.3621
, pp. 17-36
-
-
Wang, X.1
Yin, Y.2
Yu, H.3
|