Expedient Non-malleability Notions for Hash Functions
From MaRDI portal
Publication:3073712
DOI10.1007/978-3-642-19074-2_18zbMATH Open1284.94050OpenAlexW1779218008MaRDI QIDQ3073712FDOQ3073712
Authors: Paul Baecher, Dominique Schröder, Marc Fischlin
Publication date: 11 February 2011
Published in: Topics in Cryptology – CT-RSA 2011 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19074-2_18
Recommendations
- Foundations of non-malleable hash and one-way functions
- Nonoblivious hashing
- Notes on a preimage-resistant hash function
- scientific article; zbMATH DE number 177052
- A new non-Merkle-Damgård structural hash function with provable security
- Some observations on the theory of cryptographic hash functions
- scientific article; zbMATH DE number 1722677
- A caution on universal classes of hash functions
- A Failure-Friendly Design Principle for Hash Functions
- Enhanced security notions for dedicated-key hash functions: definitions and relationships
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Fast Software Encryption
- Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model
- Nonmalleable Cryptography
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Advances in Cryptology - CRYPTO 2003
- Title not available (Why is that?)
- Pseudorandom functions and permutations provably secure against related-key attacks
- Title not available (Why is that?)
- Title not available (Why is that?)
- New and improved constructions of non-malleable cryptographic protocols
- Adaptive One-Way Functions and Applications
- Title not available (Why is that?)
- Non-malleability amplification
- Concurrent Non-malleable Commitments from Any One-Way Function
- Advances in Cryptology - EUROCRYPT 2004
- New types of cryptanalytic attacks using related keys
- Concurrent non-malleable zero knowledge proofs
- Title not available (Why is that?)
- Non-malleable Obfuscation
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the Security of OAEP
- Non-interactive and reusable non-malleable commitment schemes
- Security of NMAC and HMAC Based on Non-malleability
- Foundations of non-malleable hash and one-way functions
- Extractable Perfectly One-Way Functions
- Efficiency preserving transformations for concurrent non-malleable zero knowledge
- Mitigating Dictionary Attacks on Password-Protected Local Storage
Cited In (8)
- Another step towards realizing random oracles: non-malleable point obfuscation
- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
- Witness authenticating NIZKs and applications
- Foundations of non-malleable hash and one-way functions
- Non-malleable functions and their applications
- Toward RSA-OAEP without random oracles
- On the (in)security of the BUFF transform
- Non-malleable functions and their applications
Uses Software
This page was built for publication: Expedient Non-malleability Notions for Hash Functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073712)