A characterization of chameleon hash functions and new, efficient designs (Q484332): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Seven-Property-Preserving Iterated Hashing: ROX / rank
 
Normal rank
Property / cites work
 
Property / cites work: Financial Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security in Communication Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multi-Property-Preserving Hash Domain Extension and the EMD Transform / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hash Functions from Sigma Protocols and Improvements to VSH / rank
 
Normal rank
Property / cites work
 
Property / cites work: Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic hash functions from expander graphs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035740 / rank
 
Normal rank
Property / cites work
 
Property / cites work: VSH, an Efficient and Provable Collision-Resistant Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Merkle-Damgård Revisited: How to Construct a Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4950056 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On-line/off-line digital signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434887 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Realizing Hash-and-Sign Signatures under Standard Assumptions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Short and Stateless Signatures from the RSA Assumption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Designated Verifier Proofs and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography - PKC 2006 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generalized Compact Knapsacks Are Collision Resistant / rank
 
Normal rank
Property / cites work
 
Property / cites work: SWIFFT: A Modest Proposal for FFT Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bit commitment using pseudorandomness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4036898 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Full Cryptanalysis of LPS and Morgenstern Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Faster and Smoother – VSH Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient signature generation by smart cards / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783735 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249649 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public Key Cryptography – PKC 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature / rank
 
Normal rank
Property / cites work
 
Property / cites work: Collisions for the LPS Expander Graph Hash Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Collisions in the Full SHA-1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Break MD5 and Other Hash Functions / rank
 
Normal rank

Latest revision as of 12:26, 9 July 2024

scientific article
Language Label Description Also known as
English
A characterization of chameleon hash functions and new, efficient designs
scientific article

    Statements

    A characterization of chameleon hash functions and new, efficient designs (English)
    0 references
    0 references
    0 references
    7 January 2015
    0 references
    hash functions
    0 references
    collision-resistance
    0 references
    chameleon hash functions
    0 references
    Fiat-Shamir paradigm
    0 references
    sigma protocols
    0 references
    identification schemes
    0 references
    VSH
    0 references
    GQ
    0 references
    Schnorr
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers