Hash Functions from Sigma Protocols and Improvements to VSH
From MaRDI portal
Publication:3600369
DOI10.1007/978-3-540-89255-7_9zbMath1206.94053OpenAlexW1514934100MaRDI QIDQ3600369
Publication date: 10 February 2009
Published in: Advances in Cryptology - ASIACRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_9
Related Items (5)
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes ⋮ A characterization of chameleon hash functions and new, efficient designs ⋮ New methods and abstractions for RSA-based forward secure signatures ⋮ Hash Functions from Sigma Protocols and Improvements to VSH ⋮ One-Time Signatures and Chameleon Hash Functions
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Bit commitment using pseudorandomness
- Cryptographic hash functions from expander graphs
- Efficient signature generation by smart cards
- Designated Verifier Proofs and Their Applications
- SWIFFT: A Modest Proposal for FFT Hashing
- Generalized Compact Knapsacks Are Collision Resistant
- VSH, an Efficient and Provable Collision-Resistant Hash Function
- Hash Functions from Sigma Protocols and Improvements to VSH
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks
- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- Advances in Cryptology - EUROCRYPT 2004
- How to Break MD5 and Other Hash Functions
- Seven-Property-Preserving Iterated Hashing: ROX
- Hash Functions in the Dedicated-Key Setting: Design Choices and MPP Transforms
- Finding Collisions in the Full SHA-1
- Merkle-Damgård Revisited: How to Construct a Hash Function
- Collisions for the LPS Expander Graph Hash Function
- Multi-Property-Preserving Hash Domain Extension and the EMD Transform
- Theory of Cryptography
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
- Theory of Cryptography
- Public Key Cryptography – PKC 2004
This page was built for publication: Hash Functions from Sigma Protocols and Improvements to VSH