Perfectly One-Way Probabilistic Hash Functions

by Ran Canetti , Daniele Micciancio , Omer Reingold
Citations:74 - 9 self

Documents Related by Co-Citation

106 Towards realizing random oracles: Hash functions that hide all partial information – Ran Canetti - 1997
1188 S.: Probabilistic Encryption – S Goldwasser, Micali - 1984
194 On the (im)possibility of obfuscating programs – Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, Ke Yang - 2001
370 A hard-core predicate for all one-way functions – Oded Goldreich, Leonid A. Levint - 1989
630 How to construct random functions – O Goldreich, S Goldwasser, S Micali - 1986
729 Pseudo-Random Generation from One-Way Functions – Johan HÃ¥stad, Russell Impagliazzo, Leonid A. Levin, Michael Luby - 1988
1341 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
313 Universal One-Way Hash Functions and their Cryptographic Applications – Moni Naor, Moti Yung - 1989
22 Entropic Security and the Encryption of High Entropy Messages – Yevgeniy Dodis, Adam Smith
44 On Obfuscating Point Functions – Hoeteck Wee - 2005
18 Zero-Knowledge and Code Obfuscation – Satoshi Hada - 2000
517 Theory and applications of trapdoor functions – A Yao - 1982
18 Obfuscation for Cryptographic Purposes – Dennis Hofheinz, John Malone-lee, Martijn Stam - 2007
16 Amit Sahai, Positive results and techniques for obfuscation – Ben Lynn, Manoj Prabhakaran
835 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995
607 How to generate cryptographically strong sequences of pseudorandom bits – M Blum, S Micali - 1984
286 How to Construct Pseudo-random Permutations from Pseudo-random functions – M Luby, C Rackoff - 1988
837 How To Prove Yourself: Practical Solutions to Identification and Signature Problems – Amos Fiat, Adi Shamir - 1987
247 The Random Oracle Methodology, Revisited – Ran Canetti, Oded Goldreich, Shai Halevi - 1998