The Symbiosis between Collision and Preimage Resistance
From MaRDI portal
Publication:3104691
DOI10.1007/978-3-642-25516-8_10zbMath1291.94047OpenAlexW2233837255MaRDI QIDQ3104691
Publication date: 16 December 2011
Published in: Cryptography and Coding (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25516-8_10
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Coding and information theory (compaction, compression, models of communication, encoding schemes, etc.) (aspects in computer science) (68P30)
Related Items
Open problems in hash function security ⋮ Efficient leakage-resilient MACs without idealized assumptions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An analysis of the blockcipher-based hash functions from PGV
- On-line/off-line digital signatures
- Formalizing Human Ignorance
- Blockcipher-Based Hashing Revisited
- Hash function requirements for Schnorr signatures
- A cryptanalytic time-memory trade-off
- The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes
- Advances in Cryptology - EUROCRYPT 2004
- Selecting Secure Passwords
- Seven-Property-Preserving Iterated Hashing: ROX
- Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making
- Fast Software Encryption
- Cryptography and Coding