Formalizing human ignorance: Collision-resistant hashing without the keys (2006)

by Phillip Rogaway
Venue:In Proc. Vietcrypt ’06
Citations:22 - 0 self

Documents Related by Co-Citation

167 Finding collisions in the full SHA-1 – Xiaoyun Wang, Yiqun Lisa Yin, Hongbo Yu - 2005
214 How to break MD5 and other hash functions – Xiaoyun Wang, Hongbo Yu - 2005
289 A Design Principle for Hash Functions – Ivan Damg˚ard - 1990
175 One way hash functions and DES – R Merkle - 1990
73 Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance – P. Rogaway, T. Shrimpton - 2004
59 Multi-Property-Preserving Hash Domain Extension and the EMD Transform – Mihir Bellare, Thomas Ristenpart - 2006
1333 Random Oracles are Practical: A Paradigm for Designing Efficient Protocols – Mihir Bellare, Phillip Rogaway - 1995
38 Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya, Merkle-Damg˚ard Revisited: How to Construct a Hash Function – Jean-Sébastien Coron - 2005
313 Universal One-Way Hash Functions and their Cryptographic Applications – Moni Naor, Moti Yung - 1989
58 Strengthening Digital Signatures Via Randomized Hashing – Shai Halevi, Hugo Krawczyk - 2006
74 Merkle-Damg˚ard Revisited: How to Construct a Hash Function – Jean-sébastien Coron, Yevgeniy Dodis, Cécile Malinaud, Prashant Puniya
45 A composition theorem for universal one-way hash functions – Victor Shoup - 2000
98 Collision-resistant hashing: Towards making UOWHFs practical – Mihir Bellare, Philip Rogaway - 1997
2453 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
71 Hash functions based on block ciphers: A synthetic approach – Bart Preneel, René Govaerts, Joos Vandewalle - 1993
13 Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms – Mihir Bellare, Thomas Ristenpart - 2007
93 Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions – A Joux - 2004
71 Indifferentiability, impossibility results on reductions, and applications to the random oracle methodology – Ueli Maurer, Renato Renner, Clemens Holenstein - 2004
110 Analysis and Design of Cryptographic Hash Functions – B Preneel - 1993