Security-Amplifying Combiners for Collision-Resistant Hash Functions
From MaRDI portal
Publication:3612552
Recommendations
Cited in
(17)- On the Strength of the Concatenated Hash Combiner When All the Hash Functions Are Weak
- Compression from Collisions, or Why CRHF Combiners Have a Long Output
- A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical
- Random oracle combiners: breaking the concatenation barrier for collision-resistance
- Increasing the security of hash functions
- Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction
- More Efficient Privacy Amplification With Less Random Seeds via Dual Universal Hash Function
- Non-trivial Black-Box Combiners for Collision-Resistant Hash-Functions Don’t Exist
- Robust multi-property combiners for hash functions
- Amplifying Collision Resistance: A Complexity-Theoretic Treatment
- On the Impossibility of Efficiently Combining Collision Resistant Hash Functions
- scientific article; zbMATH DE number 3970672 (Why is no real title available?)
- Combiners for functional encryption, unconditionally
- Obfuscation combiners
- Hash-Function Based PRFs: AMAC and Its Multi-User Security
- The sum can be weaker than each part
- Generic attacks on hash combiners
This page was built for publication: Security-Amplifying Combiners for Collision-Resistant Hash Functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3612552)