A New Paradigm for Collision-Free Hashing: Incrementality at Reduced Cost
暂无分享,去创建一个
[1] Miklós Ajtai,et al. Generating hard instances of lattice problems (extended abstract) , 1996, STOC '96.
[2] Claus-Peter Schnorr,et al. Attacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction , 1995, EUROCRYPT.
[3] David Chaum,et al. Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer , 1991, CRYPTO.
[4] Mihir Bellare,et al. XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions , 1995, CRYPTO.
[5] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[6] Miklós Ajtai,et al. Generating Hard Instances of Lattice Problems , 1996, Electron. Colloquium Comput. Complex..
[7] Joos Vandewalle,et al. Computer Security and Industrial Cryptography , 1993, Lecture Notes in Computer Science.
[8] Ivan Damgård,et al. Collision Free Hash Functions and Public Key Signature Schemes , 1987, EUROCRYPT.
[9] Mihir Bellare,et al. Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.
[10] Ralph C. Merkle,et al. One Way Hash Functions and DES , 1989, CRYPTO.
[11] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[12] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[13] Joos Vandewalle,et al. Hash Functions Based on Block Ciphers: A Synthetic Approach , 1993, CRYPTO.
[14] Andrew Odlyzko,et al. The Rise and Fall of Knapsack Cryptosystems , 1998 .
[15] Moni Naor,et al. Efficient cryptographic schemes provably as secure as subset sum , 1989, 30th Annual Symposium on Foundations of Computer Science.
[16] Mihir Bellare,et al. Incremental Cryptography: The Case of Hashing and Signing , 1994, CRYPTO.
[17] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[18] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[19] Daniele Micciancio,et al. Oblivious data structures: applications to cryptography , 1997, STOC '97.
[20] Marc Girault,et al. Hash-Functions Using Modulo-N Operations , 1987, EUROCRYPT.
[21] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[22] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[23] Oded Goldreich,et al. Collision-Free Hashing from Lattice Problems , 1996, Electron. Colloquium Comput. Complex..
[24] Kenneth J. Giuliani. Factoring Polynomials with Rational Coeecients , 1998 .
[25] Mihir Bellare,et al. Incremental cryptography and application to virus protection , 1995, STOC '95.
[26] Bart Preneel,et al. RIPEMD-160: A Strengthened Version of RIPEMD , 1996, FSE.
[27] J. Rosser,et al. Approximate formulas for some functions of prime numbers , 1962 .