Robust Multi-Property Combiners for Hash Functions
暂无分享,去创建一个
[1] Amir Herzberg. Folklore, practice and theory of robust combiners , 2009, J. Comput. Secur..
[2] Marc Fischlin,et al. Multi-property Preserving Combiners for Hash Functions , 2008, TCC.
[3] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[4] Mihir Bellare,et al. The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs , 2006, EUROCRYPT.
[5] Bart Preneel,et al. Seven-Property-Preserving Iterated Hashing: ROX , 2007, ASIACRYPT.
[6] Jonathan Katz,et al. Modeling insider attacks on group key-exchange protocols , 2005, CCS '05.
[7] Luca Trevisan,et al. Amplifying Collision Resistance: A Complexity-Theoretic Treatment , 2007, CRYPTO.
[8] Marc Stevens,et al. Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate , 2009, CRYPTO.
[9] Hui Chen,et al. Cryptanalysis of the Hash Functions MD4 and RIPEMD , 2005, EUROCRYPT.
[10] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[11] Adi Shamir,et al. On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak , 2008, ICALP.
[12] Phillip Rogaway,et al. Bucket Hashing and Its Application to Fast Message Authentication , 1995, Journal of Cryptology.
[13] Moni Naor,et al. Bit commitment using pseudorandomness , 1989, Journal of Cryptology.
[14] Christophe De Cannière,et al. Preimages for Reduced SHA-0 and SHA-1 , 2008, CRYPTO.
[15] Mihir Bellare,et al. Multi-Property-Preserving Hash Domain Extension and the EMD Transform , 2006, ASIACRYPT.
[16] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[17] Ueli Maurer,et al. Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology , 2004, TCC.
[18] Hugo Krawczyk,et al. LFSR-based Hashing and Authentication , 1994, CRYPTO.
[19] Mihir Bellare,et al. Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .
[20] Anja Lehmann,et al. A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical , 2009, ASIACRYPT.
[21] Marc Fischlin,et al. On the Security of OAEP , 2006, ASIACRYPT.
[22] Moni Naor,et al. On Robust Combiners for Oblivious Transfer and Other Primitives , 2005, EUROCRYPT.
[23] Marc Fischlin,et al. Security-Amplifying Combiners for Collision-Resistant Hash Functions , 2007, CRYPTO.
[24] Marc Fischlin,et al. Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes , 2005, CRYPTO.
[25] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[26] Moni Naor,et al. Bit Commitment Using Pseudo-Randomness , 1989, CRYPTO.
[27] Krzysztof Pietrzak,et al. Compression from Collisions, or Why CRHF Combiners Have a Long Output , 2008, CRYPTO.
[28] Phillip Rogaway. Bucket Hashing and its Application to Fast Message Authentication , 1995, CRYPTO.
[29] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[30] Mihir Bellare,et al. Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms , 2007, ICALP.
[31] Dan Boneh,et al. On the Impossibility of Efficiently Combining Collision Resistant Hash Functions , 2006, CRYPTO.
[32] Amir Herzberg,et al. On Tolerant Cryptographic Constructions , 2005, CT-RSA.
[33] Moni Naor,et al. On the Construction of Pseudorandom Permutations: Luby—Rackoff Revisited , 1996, Journal of Cryptology.
[34] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[35] Jean-Sébastien Coron,et al. Merkle-Damgård Revisited: How to Construct a Hash Function , 2005, CRYPTO.
[36] Marc Fischlin,et al. Robust Multi-property Combiners for Hash Functions Revisited , 2008, ICALP.
[37] Krzysztof Pietrzak,et al. Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist , 2007, EUROCRYPT.