How to Build a Hash Function from any Collision-Resistant Function (2007)

by Thomas Ristenpart , Thomas Shrimpton
Citations:12 - 3 self

Active Bibliography

13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
11 How Risky is the Random-Oracle Model? – Gaëtan Leurent, Phong Q. Nguyen
5 A Synthetic Indifferentiability Analysis of Some Block-Cipher-Based Hash Functions – Zheng Gong, Xuejia Lai, Kefei Chen - 2007
1 Security Analysis and Comparison of the SHA-3 Finalists – Elena Andreeva, Bart Mennink, Bart Preneel, Marjan ˇ Skrobot
1360 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
802 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
770 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
650 Public-key cryptosystems based on composite degree residuosity classes – Pascal Paillier - 1999
838 A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks – Shafi Goldwasser, Silvio Micali, Ronald L. Rivest - 1995