Hash Functions: From Merkle-Damgård to Shoup (2001)


Download Links

by Ilya Mironov
Citations:16 - 0 self

Active Bibliography

7 Bounds on the efficiency of “blackbox” commitment schemes – Omer Horvitz, Jonathan Katz - 2005
33 Finding collisions in interactive protocols – A tight lower bound on the round complexity of statistically-hiding commitments – Iftach Haitner, Jonathan J. Hoch, Omer Reingold, Gil Segev - 2007
10 Concealment and its applications to authenticated encryption – Yevgeniy Dodis, Jee Hea An - 2003
2 Construction of UOWHF: Tree Hashing Revisited – Palash Sarkar - 2002
1 Y.: An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions. Cryptology ePrint Archive, Report 2009/506 – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2009
A Sufficient Condition and an Optimal Domain Extension of UOWHF – Mridul Nandi - 2004
189 Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack – Ronald Cramer, Victor Shoup - 2001
61 Lower bounds on the Efficiency of Generic Cryptographic Constructions – Rosario Gennaro, Yael Gertner, Jonathan Katz, Luca Trevisan - 2000
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
2 Higher Order Universal One-Way Hash Functions – Deukjo Hong, Bart Preneel, Sangjin Lee - 2004
58 Strengthening Digital Signatures Via Randomized Hashing – Shai Halevi, Hugo Krawczyk - 2006
3 New Parallel Domain Extenders for UOWHF – Wonil Lee, Donghoon Chang, Sangjin Lee, Soohak Sung, Mridul Nandi
9 Amplifying Collision Resistance: A Complexity-Theoretic Treatment – Ran Canetti, Madhu Sudan, Luca Trevisan, Salil Vadhan, Hoeteck Wee
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption ∗ – Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang - 2006
New Second Preimage Attacks on Hash Functions ⋆ – Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sebastien Zimmer
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
45 A composition theorem for universal one-way hash functions – Victor Shoup - 2000
2 Universal One-Way Hash Functions via Inaccessible Entropy – Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil Vadhan, Hoeteck Wee - 2010