Finding Collisions on a One-Way Street: Can Secure Hash Functions be Based on General Assumptions (1998)

Cached

Download Links

by Daniel R. Simon
Citations:72 - 0 self

Active Bibliography

61 Lower bounds on the Efficiency of Generic Cryptographic Constructions – Rosario Gennaro, Yael Gertner, Jonathan Katz, Luca Trevisan - 2000
12 On constructing 1-1 one-way functions – Oded Goldreich, Leonid A Levin, Noam Nisan - 1995
28 Limits on the Efficiency of One-Way Permutation-Based Hash Functions – Jeong Han Kim, Daniel R. Simon, Prasad Tetali - 1999
13 Structural properties of one-way hash functions – Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai - 1991
58 Strengthening Digital Signatures Via Randomized Hashing – Shai Halevi, Hugo Krawczyk - 2006
KryptoKnight Protocol Cookbook – Philippe Janson, Gene Tsudik, Moti Yung - 1994
Prashant PuniyaThe Random Oracle Methodology – Jean-sebastien Coron, Yevgeniy Dodis, Cecile Malinaud
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function ⋆ – Donghoon Chang, Mridul N, Jesang Lee, Jaechul Sung, Seokhie Hong
5 A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions – Zheng Gong, Xuejia Lai, Kefei Chen - 2007
25 Herding hash functions and the Nostradamus attack – John Kelsey, Tadayoshi Kohno - 2006
74 Merkle-Damg˚ard Revisited: How to Construct a Hash Function – Jean-sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya
1 Message Encryption and Authentication Using One-Way Hash Functions – Chae Hoon Lim - 1996
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
11 Careful with composition: Limitations of the indifferentiability framework – Thomas Ristenpart, Hovav Shacham, Thomas Shrimpton - 2011
Cryptographic Hash Functions: Recent Design Trends and Security Notions ∗ – Saif Al-kuwari, James H. Davenport, Russell J. Bradford
2 Group Blind Digital Signatures: Theory and Applications – Ronald L. Rivest, Zulfikar Amin Ramzan, Zulfikar Amin Ramzan - 1999
Direct Chosen-Ciphertext Secure . . . – Eike Kiltz, David Galindo - 2006
4 Time capsule signature – Yevgeniy Dodis, Dae Hyun Yum - 2005
1 How to Use a Short Basis: Trapdoors for Hard Lattices and New Cryptographic Constructions – Craig Gentry, Vinod Vaikuntanathan, Chris Peikert - 2008