Expedient Non-malleability Notions for Hash Functions
From MaRDI portal
Publication:3073712
Recommendations
- Foundations of non-malleable hash and one-way functions
- Nonoblivious hashing
- Notes on a preimage-resistant hash function
- scientific article; zbMATH DE number 177052
- A new non-Merkle-Damgård structural hash function with provable security
- Some observations on the theory of cryptographic hash functions
- scientific article; zbMATH DE number 1722677
- A caution on universal classes of hash functions
- A Failure-Friendly Design Principle for Hash Functions
- Enhanced security notions for dedicated-key hash functions: definitions and relationships
Cites work
- scientific article; zbMATH DE number 1024009 (Why is no real title available?)
- scientific article; zbMATH DE number 1024070 (Why is no real title available?)
- scientific article; zbMATH DE number 1088253 (Why is no real title available?)
- scientific article; zbMATH DE number 2009976 (Why is no real title available?)
- scientific article; zbMATH DE number 1759793 (Why is no real title available?)
- scientific article; zbMATH DE number 1775398 (Why is no real title available?)
- scientific article; zbMATH DE number 1842495 (Why is no real title available?)
- scientific article; zbMATH DE number 1842511 (Why is no real title available?)
- scientific article; zbMATH DE number 1418315 (Why is no real title available?)
- Adaptive One-Way Functions and Applications
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - EUROCRYPT 2004
- Concurrent Non-malleable Commitments from Any One-Way Function
- Concurrent non-malleable zero knowledge proofs
- Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model
- Efficiency preserving transformations for concurrent non-malleable zero knowledge
- Extractable Perfectly One-Way Functions
- Fast Software Encryption
- Foundations of non-malleable hash and one-way functions
- Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
- Mitigating Dictionary Attacks on Password-Protected Local Storage
- New and improved constructions of non-malleable cryptographic protocols
- New types of cryptanalytic attacks using related keys
- Non-interactive and reusable non-malleable commitment schemes
- Non-malleability amplification
- Non-malleable Obfuscation
- Nonmalleable Cryptography
- On the Security of OAEP
- Pseudorandom functions and permutations provably secure against related-key attacks
- Security of NMAC and HMAC Based on Non-malleability
Cited in
(8)- Another step towards realizing random oracles: non-malleable point obfuscation
- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
- Witness authenticating NIZKs and applications
- Foundations of non-malleable hash and one-way functions
- Non-malleable functions and their applications
- Toward RSA-OAEP without random oracles
- On the (in)security of the BUFF transform
- Non-malleable functions and their applications
This page was built for publication: Expedient Non-malleability Notions for Hash Functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3073712)