Documents Related by Co-Citation

15 On the impossibility of efficiently combining collision resistant hash functions – Dan Boneh, Xavier Boyen - 2006
270 Foundation of Cryptography – Basic Tools – O Goldreich - 2001
356 A hard-core predicate for all one-way functions – Oded Goldreich, Leonid A. Levint - 1989
16 A Modular Security Analysis of the TLS Handshake Protocol – P. Morrissey, N. P. Smart, B. Warinschi - 2008
476 Keying hash functions for message authentication – Mihir Bellare, Ran Canetti, Hugo Krawczyk - 1996
313 Universal One-Way Hash Functions and their Cryptographic Applications – Moni Naor, Moti Yung - 1989
197 One-way functions are necessary and sufficient for secure signatures – John Rompel - 1990
9 Non-trivial black-box combiners for collision-resistant hash-functions don’t exist – Krzysztof Pietrzak - 2007
6 Robust Multi-Property Combiners for Hash Functions Revisited – Marc Fischlin, Anja Lehmann, Krzysztof Pietrzak
14 Immunizing Encryption Schemes from Decryption Errors – Cynthia Dwork, Moni Naor, Omer Reingold - 2004
10 An efficient parallel repetition theorem for ArthurMerlin games – R Pass, M Venkitasubramaniam - 2007
15 D.: Parallel repetition of computationally sound protocols revisited – Krzysztof Pietrzak, Douglas Wikström, Ecole Normale Supérieure Département D’informatique - 2007
20 Pseudo-random permutation generators and cryptographic composition – Michael Luby, Charles Rackoff - 1986
36 Does Parallel Repetition Lower the Error in Computationally Sound Protocols – Mihir Bellare, Russell Impagliazzo, Moni Naor - 1997
57 On Yao’s XOR lemma – Oded Goldreich, Noam Nisan, Avi Wigderson - 1995
5 SQUASH: A new one-way hash function with provable security properties for highly constrained devices such as RFID tags. Invited lecture to the RFID Security’07 Workshop. Slides available from http://mailman.few.vu.nl/pipermail/ rfidsecuritylist/2007-Augus – A Shamir
2 Combined (identity-based) public key schemes – María Isabel, González Vasco, Florian Hess, Rainer Steinw, Technische Universität Berlin
2 New Anonymity Notions for Identity-Based Encryption – Malika Izabachène, David Pointcheval
3 Proofs on encrypted values in bilinear groups and an application to anonymity of signatures – Georg Fuchsbauer, David Pointcheval - 2009