Active Bibliography

1 An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2009
581 Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web – David Karger, Eric Lehman, Tom Leighton, Matthew Levine, Daniel Lewin, Rina Panigrahy Abstract - 1997
503 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
756 Pseudo-Random Generation from One-Way Functions – Johan Håstad, Russell Impagliazzo, Leonid A. Levin, Michael Luby - 1988
670 Universally composable security: A new paradigm for cryptographic protocols – Ran Canetti - 2013
1425 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
597 Short signatures from the Weil pairing – Dan Boneh, Ben Lynn, Hovav Shacham - 2001
1246 Identity-Based Encryption from the Weil Pairing – Dan Boneh, Matthew Franklin - 2001