Random Oracle Combiners: Breaking the Concatenation Barrier for Collision-Resistance
暂无分享,去创建一个
[1] Morris Dworkin,et al. SHA-3 Standard: Permutation-Based Hash and Extendable-Output Functions , 2015 .
[2] Bart Preneel,et al. Breaking and Fixing Cryptophia's Short Combiner , 2014, CANS.
[3] Marc Fischlin,et al. Robust Multi-Property Combiners for Hash Functions , 2014, Journal of Cryptology.
[4] Arno Mittelbach,et al. Cryptophia's Short Combiner for Collision-Resistant Hash Functions , 2013, ACNS.
[5] Yevgeniy Dodis,et al. On the Instantiability of Hash-and-Sign RSA Signatures , 2012, TCC.
[6] Hovav Shacham,et al. Careful with Composition: Limitations of the Indifferentiability Framework , 2011, EUROCRYPT.
[7] Mark D. Button. Security , 2010, 5G Second Phase Explained.
[8] Krzysztof Pietrzak,et al. Compression from Collisions, or Why CRHF Combiners Have a Long Output , 2008, CRYPTO.
[9] Marc Fischlin,et al. Multi-property Preserving Combiners for Hash Functions , 2008, TCC.
[10] Luca Trevisan,et al. Amplifying Collision Resistance: A Complexity-Theoretic Treatment , 2007, CRYPTO.
[11] Krzysztof Pietrzak,et al. Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don't Exist , 2007, EUROCRYPT.
[12] Pascal Paillier,et al. Impossibility Proofs for RSA Signatures in the Standard Model , 2007, CT-RSA.
[13] Dan Boneh,et al. On the Impossibility of Efficiently Combining Collision Resistant Hash Functions , 2006, CRYPTO.
[14] Bartosz Przydatek,et al. On Robust Combiners for Private Information Retrieval and Other Primitives , 2006, CRYPTO.
[15] Yevgeniy Dodis,et al. On the Generic Insecurity of the Full Domain Hash , 2005, CRYPTO.
[16] Jean-Sébastien Coron,et al. Merkle-Damgård Revisited: How to Construct a Hash Function , 2005, CRYPTO.
[17] Moni Naor,et al. On Robust Combiners for Oblivious Transfer and Other Primitives , 2005, EUROCRYPT.
[18] Amir Herzberg,et al. On Tolerant Cryptographic Constructions , 2005, CT-RSA.
[19] Ueli Maurer,et al. Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology , 2004, TCC.
[20] D. Boneh,et al. Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.
[21] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[22] Moni Naor,et al. On Chosen Ciphertext Security of Multiple Encryptions , 2002, IACR Cryptol. ePrint Arch..
[23] G. Blakley,et al. An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems , 1981 .