Correlated-input secure hash functions
From MaRDI portal
Publication:3000539
DOI10.1007/978-3-642-19571-6_12zbMATH Open1295.94075OpenAlexW1588553798MaRDI QIDQ3000539FDOQ3000539
Authors: Vipul Goyal, Adam O'Neill, Vanishree Rao
Publication date: 19 May 2011
Published in: Theory of Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19571-6_12
Recommendations
- Two is a crowd? A black-box separation of one-wayness and security under correlated inputs
- On the correlation intractability of obfuscated pseudorandom functions
- Some observations on the theory of cryptographic hash functions
- New Constructions for Secure Hash Functions
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption
Cited In (25)
- A unified approach to deterministic encryption: new constructions and a connection to computational entropy
- Subversion-resilient signatures: definitions, constructions and applications
- An algebraic framework for pseudorandom functions and applications to related-key security
- Point-function obfuscation: a framework and generic constructions
- Secure message authentication against related-key attack
- Robust property-preserving hash functions for Hamming distance and more
- Efficient public-key cryptography with bounded leakage and tamper resilience
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption
- Beyond Uber: instantiating generic groups via PGGs
- On the correlation intractability of obfuscated pseudorandom functions
- Flexible password-based encryption: securing cloud storage and provably resisting partitioning-oracle attacks
- Augmented random oracles
- Towards forward security properties for PEKS and IBE
- Related-key security for pseudorandom functions beyond the linear barrier
- On selective-opening security of deterministic primitives
- Modeling random oracles under unpredictable queries
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman
- The Chaining Lemma and its application
- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
- On derandomizing Yao's weak-to-strong OWF construction
- Security Against Related Randomness Attacks via Reconstructive Extractors
- Bounded tamper resilience: how to go beyond the algebraic barrier
- Non-malleable Codes with Split-State Refresh
- Don't tamper with dual system encryption. Beyond polynomial related-key security of IBE
- Non-malleable functions and their applications
This page was built for publication: Correlated-input secure hash functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3000539)