Jonathan Hoch

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
New second-preimage attacks on hash functions
Journal of Cryptology
2016-10-13Paper
Finding collisions in interactive protocols -- tight lower bounds on the round and communication complexities of statistically hiding commitments
SIAM Journal on Computing
2015-06-02Paper
Finding collisions in interactive protocols -- tight lower bounds on the round and communication complexities of statistically hiding commitments
SIAM Journal on Computing
2015-06-02Paper
Breaking the ICE – Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
Fast Software Encryption
2009-04-02Paper
On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak
Automata, Languages and Programming
2008-08-19Paper
Second Preimage Attacks on Dithered Hash Functions
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
Theory of Cryptography
2008-03-05Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper


Research outcomes over time


This page was built for person: Jonathan Hoch