Fast Software Encryption
From MaRDI portal
Publication:5713919
DOI10.1007/B98177zbMath1079.68560OpenAlexW2485295499MaRDI QIDQ5713919
Phillip Rogaway, Thomas Shrimpton
Publication date: 27 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98177
provable securitycryptographic hash functionscollision resistancepreimage resistancesecond-preimage resistance
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Theory of software (68N99)
Related Items (50)
Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security ⋮ Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol ⋮ New second-preimage attacks on hash functions ⋮ The security of tandem-DM in the ideal cipher model ⋮ Deterministic secure quantum communication against collective noise ⋮ An analysis of the blockcipher-based hash functions from PGV ⋮ Locally computable UOWHF with linear shrinkage ⋮ On ``A new quantum blind signature with unlinkability ⋮ Security analysis of randomize-hash-then-sign digital signatures ⋮ Open problems in hash function security ⋮ Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice ⋮ The \(\mathcal{L_C}\)-structure-preserving algorithms of quaternion \(LDL^H\) decomposition and Cholesky decomposition ⋮ The gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functions ⋮ MPClan: protocol suite for privacy-conscious computations ⋮ Tight preimage resistance of the sponge construction ⋮ A theoretical framework for the analysis of physical unclonable function interfaces and its relation to the random oracle model ⋮ Synchronization of fuzzy-chaotic systems with Z-controller in secure communication ⋮ A simple variant of the Merkle-Damgård scheme with a permutation ⋮ MD4 is Not One-Way ⋮ Digital Signatures Out of Second-Preimage Resistant Hash Functions ⋮ Cryptanalysis and improvement of three certificateless aggregate signature schemes ⋮ How to Build a Hash Function from Any Collision-Resistant Function ⋮ Committing to Quantum Resistance, Better: A Speed-and-Risk-Configurable Defence for Bitcoin Against a Fast Quantum Computing Attack ⋮ Bitcoin Crypto–Bounties for Quantum Capable Adversaries ⋮ On the Security of the Winternitz One-Time Signature Scheme ⋮ Robust encryption ⋮ Optimal collision security in double block length hashing with single length key ⋮ Sound and complete computational interpretation of symbolic hashes in the standard model ⋮ Some observations on the theory of cryptographic hash functions ⋮ VSH, an Efficient and Provable Collision-Resistant Hash Function ⋮ Cryptanalysis of the GOST Hash Function ⋮ How to Fill Up Merkle-Damgård Hash Functions ⋮ On the collision and preimage security of MDC-4 in the ideal cipher model ⋮ Post-Quantum Cryptography: State of the Art ⋮ On chosen target forced prefix preimage resistance ⋮ On a family of preimage-resistant functions ⋮ A synthetic indifferentiability analysis of some block-cipher-based hash functions ⋮ Минимизация коллизий при квантовом хешировании ⋮ Threshold ECDSA with an offline recovery party ⋮ Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders ⋮ Characterizing Padding Rules of MD Hash Functions Preserving Collision Security ⋮ Efficiency Bounds for Adversary Constructions in Black-Box Reductions ⋮ A Three-Property-Secure Hash Function ⋮ Domain extender for collision resistant hash functions: Improving upon Merkle-Damgård iteration ⋮ XMSS - A Practical Forward Secure Signature Scheme Based on Minimal Security Assumptions ⋮ The Symbiosis between Collision and Preimage Resistance ⋮ Security of Hash-then-CBC Key Wrapping Revisited ⋮ Robust Encryption ⋮ Security analysis and improvement of a double-trapdoor encryption scheme ⋮ Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions
This page was built for publication: Fast Software Encryption