Limits on the Efficiency of One-Way Permutation-Based Hash Functions (1999)

Cached

Download Links

by Jeong Han Kim , Daniel R. Simon , Prasad Tetali
Venue:In Proceedings of the 40th Annual IEEE Symposium on Foundations of Computer Science
Citations:28 - 0 self

Active Bibliography

61 Lower bounds on the Efficiency of Generic Cryptographic Constructions – Rosario Gennaro, Yael Gertner, Jonathan Katz, Luca Trevisan - 2000
16 Hash Functions: From Merkle-Damgård to Shoup – Ilya Mironov - 2001
22 Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins – Chun-yuan Hsiao, Leonid Reyzin - 2004
4 VSH, an Efficient and Provable Collision Resistant Hash Function – Scott Contini, Arjen K. Lenstra, Ron Steinfeld
13 VSH, an Efficient and Provable Collision-Resistant Hash Function – Scott Contini, Arjen K. Lenstra, Ron Steinfeld - 2006
11 How to Build a Hash Function from any Collision-Resistant Function – Thomas Ristenpart, Thomas Shrimpton - 2007
202 How to Time-stamp a Digital Document – Stuart Haber, W. Scott Stornetta - 1991
5 XMSS - A practical forward secure signature scheme based on minimal security assumptions – Johannes Buchmann, Erik Dahmen, Andreas Hülsing, Tu Darmstadt - 2011
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption ∗ – Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang - 2006
A Sufficient Condition and an Optimal Domain Extension of UOWHF – Mridul Nandi - 2004
2 Construction of UOWHF: Tree Hashing Revisited – Palash Sarkar - 2002
2 Domain Extender for Collision Resistant Hash Functions Using a Directed Acyclic Graph – Palash Sarkar - 2003
New Second Preimage Attacks on Hash Functions ⋆ – Elena Andreeva, Charles Bouillaguet, Orr Dunkelman, Pierre-alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sebastien Zimmer
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
1 Y.: An Investigation of the Enhanced Target Collision Resistance Property for Hash Functions. Cryptology ePrint Archive, Report 2009/506 – Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu - 2009
2 Security-amplifying combiners for collision-resistant hash functions – Marc Fischlin, Anja Lehmann - 2007
26 Constructing VIL-MACs from FIL-MACs: Message authentication under weakened assumptions – Jee Hea An, Mihir Bellare - 1999
2 Masking Based Domain Extenders for UOWHFs: Bounds and Constructions – Palash Sarkar - 2003
22 Formalizing human ignorance: Collision-resistant hashing without the keys – Phillip Rogaway - 2006